* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures
"synopsis" may belong to another edition of this title.
TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.
Your in-depth guide to implementing and optimizing an effective intrusion detection system for your network
Here's the in-the-trenches handbook you've been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step-by-step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You'll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS.
Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you're responsible for network security, this is the guidebook that will help you get a good night's sleep-at last.
You'll learn how to:
* Implement an effective IDS for host, network, and combined systems
* Understand challenges like evasion, unknown attacks, and false alerts
* Verify, test, and fine-tune intrusion detection systems
* Analyze various IDS products and determine what meets your organization's needs
* Cope with legal issues and architectural challenges
* Identify, verify, and respond to different types of attacks and alerts
* Investigate security breaches and prevent recurrences
Your in-depth guide to implementing and optimizing an effective intrusion detection system for your network
Here's the in-the-trenches handbook you've been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step-by-step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You'll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS.
Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you're responsible for network security, this is the guidebook that will help you get a good night's sleep-at last.
You'll learn how to:
* Implement an effective IDS for host, network, and combined systems
* Understand challenges like evasion, unknown attacks, and false alerts
* Verify, test, and fine-tune intrusion detection systems
* Analyze various IDS products and determine what meets your organization's needs
* Cope with legal issues and architectural challenges
* Identify, verify, and respond to different types of attacks and alerts
* Investigate security breaches and prevent recurrences
"About this title" may belong to another edition of this title.
£ 4.46 shipping from U.S.A. to United Kingdom
Destination, rates & speedsSeller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Fair. 1. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 0764549499-7-1
Quantity: 1 available
Seller: Shakespeare Book House, Rockford, IL, U.S.A.
Condition: Acceptable. Item in acceptable condition including possible liquid damage. As well answers may be filled in. May be missing DVDs, CDs, Access code, etc. 100%Money-Back Guarantee! Ship within 24 hours!! Seller Inventory # 570W2K00000L_ns
Quantity: 1 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 628354
Quantity: Over 20 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 3.25. Seller Inventory # G0764549499I5N00
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 3.25. Seller Inventory # G0764549499I5N00
Quantity: 1 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 628354-n
Quantity: Over 20 available
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. * Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective * Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS * Features coverage of the recently revised IETF IDS specification * Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling * Provides step-by-step instructions for configuration procedures Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9780764549496
Quantity: 1 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9780764549496_new
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9780764549496
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Seller Inventory # 628354-5
Quantity: 5 available