This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network l
Intrusion Prevention and Active Response. Deploying Network and Host IPS
โ Scribed by Michael Rash, Angela Orebaugh, Graham Clark, Becky Pinkard and Jake Babbin (Eds.)
- Publisher
- Syngress Pub
- Year
- 2005
- Tongue
- English
- Leaves
- 408
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Content:
Acknowledgements, Page v
Lead author/technical editor, Page vii
Contributing authors, Pages vii-ix
Technical reviewer, Page ix
Foreword, Pages xix-xx
Chapter 1 - Intrusion prevention and active response, Pages 1-28
Chapter 2 - Packet inspection for intrusion analysis, Pages 29-72
Chapter 3 - False positives and real damage, Pages 73-104
Chapter 4 - Four layers of IPS actions, Pages 105-132
Chapter 5 - Network inline data modification, Pages 133-191
Chapter 6 - Protecting your host through the operating system, Pages 193-256
Chapter 7 - IPS at the application layer, Pages 257-293
Chapter 8 - Deploying open source IPS solutions, Pages 295-366
Chapter 9 - IPS evasion techniques (Network), Pages 367-388
Index, Pages 389-402
๐ SIMILAR VOLUMES
Although IP and WDM technologies are expected to become the dominant network technologies, they will be introduced gradually to complement and replace ATM and SDH network solutions. This text reviews and researches results for the deployment and management of IP over WDM networks with guaranteed ser
Although IP and WDM technologies are expected to become the dominant network technologies, they will be introduced gradually to complement and replace ATM and SDH network solutions. This text reviews and researches results for the deployment and management of IP over WDM networks with guaranteed ser
Although IP and WDM technologies are expected to become the dominant network technologies, they will be introduced gradually to complement and replace ATM and SDH network solutions. This text reviews and researches results for the deployment and management of IP over WDM networks with guaranteed ser
Written by a self-confessed ex-hacker, this insider's guide is an instant primer into all the things that can go wrong, with advice on how to stop it from happening or, if it's too late, how to fix the damage