Amazon cover image
Image from Amazon.com
Image from Google Jackets

Intrusion detection & prevention / Carl Endorf, Dr. Eugene Schultz, Jim Mellander.

By: Contributor(s): Material type: TextTextPublication details: New York : McGraw-Hill/Osborne, c2004.Description: xxxi, 386 p. : ill. ; 24 cmISBN:
  • 9780072229547
Other title:
  • Intrusion detection and prevention
Subject(s): DDC classification:
  • 005.8   22
Contents:
Part I: Intrusion Detection: Primer -- 1: Understanding Intrusion Detection -- 2: Crash Course in the Internet Protocol Suite -- 3: Unauthorized Activity I -- 4: Unauthorized Activity II -- 5: Tcpdump -- Part II: Architecture -- 6: IDS and IPS Architecture -- 7: IDS and IPS Internals -- Part III: Implementation and Deployment -- 8: Internet Security System’s RealSecure -- 9: Cisco Secure IDS -- 10: Snort -- 11: NFR Security -- Part IV: Security and IDS Management -- 12: Data Correlation -- 13: Incident Response -- 14: Policy and Procedures -- 15: Laws, Standards, and Organizations -- 16: Security Business Issues -- 17: The Future of Intrusion Detection and Prevention -- A: Intrusion Detection and Prevention Systems.
Summary: Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Security Systems' Black ICE & RealSecure, Cisco Systems' Secure IDS, Computer Associates’ eTrust, Entercept, and the open source Snort tool.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Main library General Stacks 005.8 / EN.I 2004 (Browse shelf(Opens below)) 1 Available 002654

Includes index.

Part I: Intrusion Detection: Primer -- 1: Understanding Intrusion Detection -- 2: Crash Course in the Internet Protocol Suite -- 3: Unauthorized Activity I -- 4: Unauthorized Activity II -- 5: Tcpdump -- Part II: Architecture -- 6: IDS and IPS Architecture -- 7: IDS and IPS Internals -- Part III: Implementation and Deployment -- 8: Internet Security System’s RealSecure -- 9: Cisco Secure IDS -- 10: Snort -- 11: NFR Security -- Part IV: Security and IDS Management -- 12: Data Correlation -- 13: Incident Response -- 14: Policy and Procedures -- 15: Laws, Standards, and Organizations -- 16: Security Business Issues -- 17: The Future of Intrusion Detection and Prevention -- A: Intrusion Detection and Prevention Systems.

Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Security Systems' Black ICE & RealSecure, Cisco Systems' Secure IDS, Computer Associates’ eTrust, Entercept, and the open source Snort tool.

1

There are no comments on this title.

to post a comment.