๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Intrusion Detection: Network Security Beyond the Firewall

โœ Scribed by Terry Escamilla


Publisher
Wiley
Year
1998
Tongue
English
Leaves
372
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products

Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever on the alert, to sniff out suspicious behavior on your network. This book gives you the additional ammo you need. Terry Escamilla shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense. He provides:
* Assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security
* Recommendations for dramatically improving network security using the right combination of intrusion detection products
* The lowdown on identification and authentication, firewalls, and access control
* Detailed comparisons between today's leading intrusion detection product categories
* A practical perspective on how different security products fit together to provide protection for your network

The companion Web site at www.wiley.com/compbooks/escamilla features: White papers
* Industry news
* Product information


๐Ÿ“œ SIMILAR VOLUMES


The Tao of network security monitoring:
โœ Bejtlich, Richard;Gula, Ron(Foreword by) ๐Ÿ“‚ Library ๐Ÿ“… 2004;2010 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

"The book you are about to read will arm you with the knowledge you need to defend your network from attackers--both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many

The Tao of network security monitoring b
โœ Richard Bejtlich ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate dama

Extrusion detection: security monitoring
โœ Bejtlich, Richard ๐Ÿ“‚ Library ๐Ÿ“… 2005;2006 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

<b>Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks</b><br /><br />Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software.

Intrusion Detection Networks: A Key to C
โœ Carol Fung, Raouf Boutaba ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Auerbach Publications,CRC Press ๐ŸŒ English

<P>The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your