Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Implementing Intrusion Detection Systems: A Hands–On Guide for Securing the Network - ISBN 9780764549496

Implementing Intrusion Detection Systems: A Hands–On Guide for Securing the Network

ISBN 9780764549496

Autor: Tim Crothers

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 277,20 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780764549496

ISBN10:      

0764549499

Autor:      

Tim Crothers

Oprawa:      

Paperback

Rok Wydania:      

2002-12-13

Ilość stron:      

336

Wymiary:      

235x190

Tematy:      

UT

Your in–depth guide to implementing and optimizing an effective intrusion detection system for your network
Here’s the in–the–trenches handbook you’ve been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step–by–step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You’ll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS.
Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you’re responsible for network security, this is the guidebook that will help you get a good night’s sleep–at last.
 You’ll learn how to:Implement an effective IDS for host, network, and combined systemsUnderstand challenges like evasion, unknown attacks, and false alertsVerify, test, and fine–tune intrusion detection systemsAnalyze various IDS products and determine what meets your organization’s needsCope with legal issues and architectural challengesIdentify, verify, and respond to different types of attacks and alertsInvestigate security breaches and prevent recurrences

Spis treści:
Preface.
Acknowledgments.
Chapter 1: An Overview of Intrusion Detection.
Chapter 2: Network–Based Intrusion Detection Systems.
Chapter 3: Host–Based Intrusion Detection.
Chapter 4: Handling Alerts.
Chapter 5: Coping with Challenges to IDS.
Chapter 6: Deploying IDS.
Chapter 7: Maximizing Your IDS.
Chapter 8: Sample IDS Deployment.
Appendix A: Understanding tcpdump Packet Headers.
Appendix B: Add itional Resources.
Appendix C: Glossary.
Appendix D: TCP/IP Quick Reference.
Appendix E: IDS Product Information.
Index.

Nota biograficzna:
TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e–security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.

Okładka tylna:
Your in–depth guide to implementing and optimizing an effective intrusion detection system for your network
Here’s the in–the–trenches handbook you’ve been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step–by–step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You’ll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS.
Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you’re responsible for network security, this is the guidebook that will help you get a good night’s sleep–at last.
 You’ll learn how to:Implement an effective IDS for host, network, and combined systemsUnderstand challenges like evasion, unknown attacks, and false alertsVerify, test, and fine–tune intrusion detection systemsAnalyze various IDS products and determine what meets your organization’s needsCope with legal issues and architectural challengesIdentify, verify, and respond to different types of attacks and alertsInvestigate security breaches and prevent recurrences

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy