OUR STORE IS CLOSED ON ANZAC DAY: THURSDAY 25 APRIL

Close Notification

Your cart does not contain any items

Implementing Intrusion Detection Systems

A Hands-On Guide for Securing the Network

Tim Crothers (ITM Technologies, Grand Rapids, Michigan)

$90.95

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
John Wiley & Sons Inc
27 November 2002

* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures

By:  
Imprint:   John Wiley & Sons Inc
Country of Publication:   United States
Dimensions:   Height: 235mm,  Width: 191mm,  Spine: 19mm
Weight:   494g
ISBN:   9780764549496
ISBN 10:   0764549499
Pages:   336
Publication Date:  
Audience:   General/trade ,  Professional and scholarly ,  Professional & Vocational ,  ELT Advanced ,  Further / Higher Education
Format:   Paperback
Publisher's Status:   Active
Preface. Acknowledgments. Chapter 1: An Overview of Intrusion Detection. Chapter 2: Network-Based Intrusion Detection Systems. Chapter 3: Host-Based Intrusion Detection. Chapter 4: Handling Alerts. Chapter 5: Coping with Challenges to IDS. Chapter 6: Deploying IDS. Chapter 7: Maximizing Your IDS. Chapter 8: Sample IDS Deployment. Appendix A: Understanding tcpdump Packet Headers. Appendix B: Additional Resources. Appendix C: Glossary. Appendix D: TCP/IP Quick Reference. Appendix E: IDS Product Information. Index.

TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.

See Also