As the number of corporate, government, and educational networks grows and becomes more connected, so too does the number of attacks on those networks. Stephen Northcutt - original developer of the Shadow intrusion detection system, former head of the Department of Defense's Shadow Intrusion Detecti
Network Intrusion Detection
โ Scribed by Stephen Northcutt, Judy Novak
- Publisher
- New Riders Pub
- Year
- 2002
- Tongue
- English
- Leaves
- 346
- Edition
- 3rd ed
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This is a great book for both someone new to intrusion detection and people who already have familiarity with the field. A great, easily approachable chapter on internet basics, followed by very clear descriptions and examples. Combines specific examples with discussion of the broader context, themes, and issues around intrusion detection. And there's also a fair bit of humor and "in the trenches" feel, making the book a lor more fun to read than I thought it would be. For my purposes, I found this book the "mother lode" giving me the information and perspective I needed.
๐ SIMILAR VOLUMES
This is a great book for both someone new to intrusion detection and people who already have familiarity with the field. A great, easily approachable chapter on internet basics, followed by very clear descriptions and examples. Combines specific examples with discussion of the broader context, the
<span>The foundational guide for using deception against computer network adversaries. <br><br> When an attacker breaks into your network, you have a home-field advantage. But how do you use it? <br><br>Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring ho
<span>A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products<br> <br> Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the r