000 01803cam a2200301 a 4500
008 080717s2002 inua 001 0 eng
010 _a2001099565
020 _a0735712654
035 _a(Sirsi) u765
040 _aEG-CaNU
_cEG-CaNU
_dEG-CaNU
042 _ancode
082 0 0 _a005.8
_2 22
100 1 _aNorthcutt, Stephen.
_913701
245 1 0 _aNetwork intrusion detection /
_c Stephen Northcutt, Judy Novak.
250 _a3rd ed.
260 _aIndianapolis, Ind. :
_b New Riders Pub.,
_c 2002, c2003.
300 _axvii, 490 p. :
_b ill. ;
_c 23 cm.
500 _aIncludes index.
505 0 _ai. tcp/ip -- ii. traffic analysis. -- iii. filters/rules for network monitoring. -- iv. intrusion infrastructure -- v. appendixes -- index.
520 _aThe Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filter
520 _aUS Chief Information Warfare Officer Stephen Northcutt provides information on how to protect a corporate network. Included is advice and technical content, reviewed by the top names in network security.
630 0 0 _aCIT.
_914
650 0 _aComputer networks
_x Security measures.
_913702
650 0 _aInternet
_x Security measures.
_913703
650 0 _aComputer security.
_913704
700 1 _aNovak, Judy.
_96586
596 _a1
999 _c6620
_d6620