Network intrusion detection / Stephen Northcutt, Judy Novak.
Material type:
TextPublication details: Indianapolis, Ind. : New Riders Pub., 2002, c2003.Edition: 3rd edDescription: xvii, 490 p. : ill. ; 23 cmISBN: - 0735712654
- 005.8 22
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.8 / NO.N 2002 (Browse shelf(Opens below)) | 1 | Available | 000979 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 / MC.S 2006 Software security : | 005.8 / MO.C 2007 Cryptography and security services : | 005.8 / NE.C 2010 Computer security : | 005.8 / NO.N 2002 Network intrusion detection / | 005.8 / OB.S 2007 Security of e-systems and computer networks / | 005.8 / OR.B 2009 Beautiful security / | 005.8 / PA.I 2009 Implementing Cisco IOS network security (IINS) / |
Includes index.
i. tcp/ip -- ii. traffic analysis. -- iii. filters/rules for network monitoring. -- iv. intrusion infrastructure -- v. appendixes -- index.
The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filter
US Chief Information Warfare Officer Stephen Northcutt provides information on how to protect a corporate network. Included is advice and technical content, reviewed by the top names in network security.
1
There are no comments on this title.