This is a great book for both someone new to intrusion detection and people who already have familiarity with the field. A great, easily approachable chapter on internet basics, followed by very clear descriptions and examples. Combines specific examples with discussion of the broader context, the
Network Intrusion Detection
โ Scribed by Stephen Northcutt, Judy Novak
- Publisher
- Sams
- Year
- 2002
- Tongue
- English
- Leaves
- 456
- Edition
- 3
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
As the number of corporate, government, and educational networks grows and becomes more connected, so too does the number of attacks on those networks. Stephen Northcutt - original developer of the Shadow intrusion detection system, former head of the Department of Defense's Shadow Intrusion Detection Team, and currently the Chief Information Warfare Officer for the U.S. Ballistic Missile Defense Organization - gives you Network Intrusion Detection: An Analyst's Handbook.Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains unparalleled, practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures.Ideal for the serious security analyst, Network Intrusion Detection: An Analysts Handbook is the tool that puts you in full control of your network's security.If you are responsible for monitoring and protecting your network against attack, use this book to: Identify vulnerable targets on your system Mitigate your security risks Recognize common and unusual attack patterns Create effective filters, honeypots, and firewalls Know and disable your enemies Recognize real detects versus false alarms, and know when to report them Set up your system to avoid false detects Evaluate ID systems and third-party tools Learn about automated response and manualresponse in relation to real-time analysis Propose and justify ID expenditures to management
๐ SIMILAR VOLUMES
This is a great book for both someone new to intrusion detection and people who already have familiarity with the field. A great, easily approachable chapter on internet basics, followed by very clear descriptions and examples. Combines specific examples with discussion of the broader context, the
<span>The foundational guide for using deception against computer network adversaries. <br><br> When an attacker breaks into your network, you have a home-field advantage. But how do you use it? <br><br>Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring ho
<span>A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products<br> <br> Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the r