With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever. Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers: practical considerations for selecting and implementing intrusion detection systems; methods of handling the results of analysis, and the options for responses to detected problems, data sources commonly used in intrusion detection and how they influence the capabilities of all intrusion detection systems; legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems. More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed discussion of the vulnerabilities inherent in many systems, and approaches to testing systems for these problems.
Les mer
Presenting real analysis schemes and responses as well as a detailed discussion of the vulnerabilities that exist in many systems and approaches to testing systems for these problems, this book is for courses in network security.
Les mer
 1. The History of Intrusion Detection.  2. Concepts and Definitions.  3. Information Sources.  4. Analysis Schemes.  5. Responses.  6. Vulnerability Analysis—A Special Case.  7. Current Issues.  8. So Why Do We Need This Stuff?  9. For Users. 10. For Strategists. 11. For Designers. 12. Future Needs.
Les mer
With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever. Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers: practical considerations for selecting and implementing intrusion detection systems; methods of handling the results of analysis, and the options for responses to detected problems, data sources commonly used in intrusion detection and how they influence the capabilities of all intrusion detection systems; legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems. More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed discussion of the vulnerabilities inherent in many systems, and approaches to testing systems for these problems.
Les mer
With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever. Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers: practical considerations for selecting and implementing intrusion detection systems; methods of handling the results of analysis, and the options for responses to detected problems, data sources commonly used in intrusion detection and how they influence the capabilities of all intrusion detection systems; legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems. More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed discussion of the vulnerabilities inherent in many systems, and approaches to testing systems for these problems.
Les mer
Practical considerations for selecting and implementing intrusion detection systems from an industry pioneer. Methods for handling the results of analysis, and the options for responses to detected problems. Data sources commonly used in intrusion detection and how they influence the capabilities of the intrusion detection system—Including host-based, network-based, and out-of-band sources. Legal issues surrounding intrusion detection and monitoring that affect the design, development, and operation of intrusion detection systems. Organization through a full acquisition-lifecycle—From initial requirements definition to deployment for a commercial intrusion detection product. Choosing your systems' responses to detected problems and tie the results back into the site security management process. Readers are able to assess the quality of a proposed or existing intrusion detection system design.
Les mer

Produktdetaljer

ISBN
9781578701858
Publisert
2000-01-13
Utgiver
Vendor
Sams Publishing
Vekt
100 gr
Høyde
100 mm
Bredde
100 mm
Dybde
100 mm
Aldersnivå
U, 05
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
368

Forfatter