Intrusion Detection: Network Security Beyond the Firewall
โ Scribed by Terry Escamilla
- Publisher
- Wiley
- Year
- 1998
- Tongue
- English
- Leaves
- 372
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products
Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever on the alert, to sniff out suspicious behavior on your network. This book gives you the additional ammo you need. Terry Escamilla shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense. He provides:
* Assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security
* Recommendations for dramatically improving network security using the right combination of intrusion detection products
* The lowdown on identification and authentication, firewalls, and access control
* Detailed comparisons between today's leading intrusion detection product categories
* A practical perspective on how different security products fit together to provide protection for your network
The companion Web site at www.wiley.com/compbooks/escamilla features: White papers
* Industry news
* Product information
๐ SIMILAR VOLUMES
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers--both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many
In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate dama
<b>Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks</b><br /><br />Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software.
<P>The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your