did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781598634143

Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection

by
  • ISBN13:

    9781598634143

  • ISBN10:

    1598634143

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2007-06-12
  • Publisher: Cengage Learning Ptr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $29.99

Summary

How safe is your network? Intrusion Alert: an Ethical Hacking Guide to Intrusion Detection provides an in-depth look at the intrusion detection systems that are currently available to help protect your networks from cyber criminals. The book begins by explaining various security concepts and the basics of security attacks, and then goes on to provide an introduction intrusion detection systems (IDS), how these systems work, and principles of IDS and the IDS architecture. The second section of the book deals with the installation and configuration of various IDS tools including tcpdump, ISA Server 2004 and Snort. Readers learn to implement these products, understand essential administration and maintenance tasks, and fine tune and use the data they provide appropriately.

Table of Contents

Introduction to Intrusion-Detection and Intrusion-Prevention System
What is an IDS?
What is an IPS?
History?
Why should we go for an IDS and/or IPS?
Understanding IDS and IPS Analysis Schemes
Some Myths
Computer Security and Intrusion
Detection Security
Attacks and Security Properties
Security Mechanisms
Intrusion Detection
Attack framework
Security Events, Vulnerabilities
Attacks Incidents Intruders
Principles of IDS
Attacks signs
Information sources for attacks
IDS Classification
Architecture of the Intrusion
Detection System
Host-Level Intrusion
Detection Systems
Network-Level Intrusion
Detection Systems
Life Cycle of IDS
Lifecycle of the IDS
Infrastructure Project
Justifying the product
Bringing the IDS into Operation
How to select an IDS
Initial Analysis Types of customer
Evaluation Criteria
Testing Incident Response
Response Types
The Incident Response
Process IDS and IPS Incident-Response
Phase Forensics
Other Issues
Policies and Procedures Policies
Standards, Guidelines, Procedures, and Baselines
The future
The Future of Intrusion Detection and Prevention
Internet Protocol Suite
Introduction to tcpdump
List of Intrusion Detection and Prevention Systems.
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program