Network Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection / Edition 1by Ankit Fadia, Manu Zacharia
How safe is your network? Intrusion Alert: an Ethical Hacking Guide to Intrusion Detection provides an in-depth look at the intrusion detection systems that are currently available to help protect your networks from cyber criminals. The book begins by explaining various security concepts and the basics of security attacks, and then goes on to provide an… See more details below
How safe is your network? Intrusion Alert: an Ethical Hacking Guide to Intrusion Detection provides an in-depth look at the intrusion detection systems that are currently available to help protect your networks from cyber criminals. The book begins by explaining various security concepts and the basics of security attacks, and then goes on to provide an introduction intrusion detection systems (IDS), how these systems work, and principles of IDS and the IDS architecture. The second section of the book deals with the installation and configuration of various IDS tools including tcpdump, ISA Server 2004 and Snort. Readers learn to implement these products, understand essential administration and maintenance tasks, and fine tune and use the data they provide appropriately.
- Cengage Learning
- Publication date:
- Edition description:
- New Edition
- Product dimensions:
- 5.90(w) x 9.00(h) x 0.90(d)
Table of Contents
Introduction to Intrusion-Detection and Intrusion-Prevention System What is an IDS? What is an IPS? History? Why should we go for an IDS and/or IPS? Understanding IDS and IPS Analysis Schemes. Some Myths Computer Security and Intrusion Detection Security Attacks and Security Properties Security Mechanisms Intrusion Detection Attack framework Security Events, Vulnerabilities Attacks Incidents Intruders Principles of IDS Attacks signs Information sources for attacks IDS Classification Architecture of the Intrusion Detection System Host-Level Intrusion Detection Systems Network-Level Intrusion Detection Systems Life Cycle of IDS Lifecycle of the IDS Infrastructure Project Justifying the product Bringing the IDS into Operation How to select an IDS Initial Analysis Types of customer Evaluation Criteria Testing Incident Response Response Types The Incident Response Process IDS and IPS Incident-Response Phase Forensics Other Issues Policies and Procedures Policies, Standards, Guidelines, Procedures, and Baselines The future The Future of Intrusion Detection and Prevention Appendix A - Internet Protocol Suite Appendix B - Introduction to tcpdump Appendix C - List of Intrusion Detection and Prevention Systems.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >