Cart
Free US shipping over $10
Proud to be B-Corp

Implementing Intrusion Detection Systems Tim Crothers

Implementing Intrusion Detection Systems By Tim Crothers

Implementing Intrusion Detection Systems by Tim Crothers


$39.87
Condition - Very Good
Only 1 left

Summary

Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling.

Faster Shipping

Get this product faster from our US warehouse

Implementing Intrusion Detection Systems Summary

Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network by Tim Crothers

Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It features coverage of the recently revised IETF IDS specification. It covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling. It provides step-by-step instructions for configuration procedures.

About Tim Crothers

TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.

Table of Contents

Preface.Acknowledgments.Chapter 1: An Overview of Intrusion Detection.Chapter 2: Network-Based Intrusion Detection Systems.Chapter 3: Host-Based Intrusion Detection.Chapter 4: Handling Alerts.Chapter 5: Coping with Challenges to IDS.Chapter 6: Deploying IDS.Chapter 7: Maximizing Your IDS.Chapter 8: Sample IDS Deployment.Appendix A: Understanding tcpdump Packet Headers.Appendix B: Additional Resources.Appendix C: Glossary.Appendix D: TCP/IP Quick Reference.Appendix E: IDS Product Information.Index.

Additional information

CIN0764549499VG
9780764549496
0764549499
Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network by Tim Crothers
Used - Very Good
Paperback
John Wiley & Sons Inc
2002-12-13
336
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Implementing Intrusion Detection Systems