Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se
Intrusion Detection and Prevention
β Scribed by Carl Endorf, Gene Schultz, Jim Mellander
- Publisher
- McGraw-Hill Osborne Media
- Year
- 2003
- Tongue
- English
- Leaves
- 242
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Security Systems' Black ICE & RealSecure, Cisco Systems' Secure IDS, Computer Associatesβ eTrust, Entercept, and the open source Snort tool.
β¦ Table of Contents
Cover-F
Contents
Introduction
Part I Prep to Build Web Site
01 Before You Get Started
02 Domain Name & Web Server
03 Gathering Web Content
Part II Create & Upload Web Site
04 Using PageBuilder
05 Using FrontPage
06 Using Dreamweaver
07 Server-Side Interactivity
Part III Keep Your Site Working
08 Search Engines
09 Troubleshoot Your Site
Index
Cover-B
π SIMILAR VOLUMES
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most
<P>The objective of this edited book is to solicit state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It will include chapters dealing with fundamental theory, techniques, applications, as we