Network Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection / Edition 1

Network Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection / Edition 1

by Ankit Fadia, Manu Zacharia
     
 

ISBN-10: 1598634143

ISBN-13: 9781598634143

Pub. Date: 06/12/2007

Publisher: Cengage Learning

How safe is your network? Intrusion Alert: an Ethical Hacking Guide to Intrusion Detection provides an in-depth look at the intrusion detection systems that are currently available to help protect your networks from cyber criminals. The book begins by explaining various security concepts and the basics of security attacks, and then goes on to provide an

…  See more details below

Overview

How safe is your network? Intrusion Alert: an Ethical Hacking Guide to Intrusion Detection provides an in-depth look at the intrusion detection systems that are currently available to help protect your networks from cyber criminals. The book begins by explaining various security concepts and the basics of security attacks, and then goes on to provide an introduction intrusion detection systems (IDS), how these systems work, and principles of IDS and the IDS architecture. The second section of the book deals with the installation and configuration of various IDS tools including tcpdump, ISA Server 2004 and Snort. Readers learn to implement these products, understand essential administration and maintenance tasks, and fine tune and use the data they provide appropriately.

Product Details

ISBN-13:
9781598634143
Publisher:
Cengage Learning
Publication date:
06/12/2007
Edition description:
New Edition
Pages:
304
Product dimensions:
5.90(w) x 9.00(h) x 0.90(d)

Table of Contents

Introduction to Intrusion-Detection and Intrusion-Prevention System What is an IDS? What is an IPS? History? Why should we go for an IDS and/or IPS? Understanding IDS and IPS Analysis Schemes. Some Myths Computer Security and Intrusion Detection Security Attacks and Security Properties Security Mechanisms Intrusion Detection Attack framework Security Events, Vulnerabilities Attacks Incidents Intruders Principles of IDS Attacks signs Information sources for attacks IDS Classification Architecture of the Intrusion Detection System Host-Level Intrusion Detection Systems Network-Level Intrusion Detection Systems Life Cycle of IDS Lifecycle of the IDS Infrastructure Project Justifying the product Bringing the IDS into Operation How to select an IDS Initial Analysis Types of customer Evaluation Criteria Testing Incident Response Response Types The Incident Response Process IDS and IPS Incident-Response Phase Forensics Other Issues Policies and Procedures Policies, Standards, Guidelines, Procedures, and Baselines The future The Future of Intrusion Detection and Prevention Appendix A - Internet Protocol Suite Appendix B - Introduction to tcpdump Appendix C - List of Intrusion Detection and Prevention Systems.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >