Intrusion detection & prevention /
Intrusion detection and prevention
Carl Endorf, Dr. Eugene Schultz, Jim Mellander.
- New York : McGraw-Hill/Osborne, c2004.
- xxxi, 386 p. : ill. ; 24 cm.
Includes index.
Part I: Intrusion Detection: Primer -- 1: Understanding Intrusion Detection -- 2: Crash Course in the Internet Protocol Suite -- 3: Unauthorized Activity I -- 4: Unauthorized Activity II -- 5: Tcpdump -- Part II: Architecture -- 6: IDS and IPS Architecture -- 7: IDS and IPS Internals -- Part III: Implementation and Deployment -- 8: Internet Security System’s RealSecure -- 9: Cisco Secure IDS -- 10: Snort -- 11: NFR Security -- Part IV: Security and IDS Management -- 12: Data Correlation -- 13: Incident Response -- 14: Policy and Procedures -- 15: Laws, Standards, and Organizations -- 16: Security Business Issues -- 17: The Future of Intrusion Detection and Prevention -- A: Intrusion Detection and Prevention Systems.
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Security Systems' Black ICE & RealSecure, Cisco Systems' Secure IDS, Computer Associates’ eTrust, Entercept, and the open source Snort tool.