000 02437cam a2200325 a 4500
008 090809s2004 caua 001 0 eng
010 _a2004276086
020 _a9780072229547
035 _a(Sirsi) u2211
040 _aEG-CaNU
_cEG-CaNU
_dEG-CaNU
042 _ancode
082 0 0 _a005.8
_2 22
100 1 _aEndorf, Carl F.,
_d 1969-
_93873
245 1 0 _aIntrusion detection & prevention /
_c Carl Endorf, Dr. Eugene Schultz, Jim Mellander.
246 3 _aIntrusion detection and prevention
260 _aNew York :
_b McGraw-Hill/Osborne,
_c c2004.
300 _axxxi, 386 p. :
_b ill. ;
_c 24 cm.
500 _aIncludes index.
505 0 _aPart I: Intrusion Detection: Primer -- 1: Understanding Intrusion Detection -- 2: Crash Course in the Internet Protocol Suite -- 3: Unauthorized Activity I -- 4: Unauthorized Activity II -- 5: Tcpdump -- Part II: Architecture -- 6: IDS and IPS Architecture -- 7: IDS and IPS Internals -- Part III: Implementation and Deployment -- 8: Internet Security System’s RealSecure -- 9: Cisco Secure IDS -- 10: Snort -- 11: NFR Security -- Part IV: Security and IDS Management -- 12: Data Correlation -- 13: Incident Response -- 14: Policy and Procedures -- 15: Laws, Standards, and Organizations -- 16: Security Business Issues -- 17: The Future of Intrusion Detection and Prevention -- A: Intrusion Detection and Prevention Systems.
520 _aAuthors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Security Systems' Black ICE & RealSecure, Cisco Systems' Secure IDS, Computer Associates’ eTrust, Entercept, and the open source Snort tool.
650 0 _aComputer networks
_x Security measures.
_93874
650 0 _aInternet
_x Security measures.
_93875
650 0 _aComputer security.
_93876
700 1 _aSchultz, Eugene.
_93877
700 1 _aMellander, Jim.
_93878
596 _a1
999 _c1317
_d1317