* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.
Your in-depth guide to implementing and optimizing an effective intrusion detection system for your network
Here s the in-the-trenches handbook you ve been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step-by-step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You ll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS.
Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you re responsible for network security, this is the guidebook that will help you get a good night s sleep at last.
You ll learn how to:
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 7,03 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: BooksRun, Philadelphia, PA, USA
Paperback. Zustand: Fair. 1. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Artikel-Nr. 0764549499-7-1
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 1.2. Artikel-Nr. G0764549499I5N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.2. Artikel-Nr. G0764549499I4N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 1.2. Artikel-Nr. G0764549499I5N00
Anzahl: 1 verfügbar
Anbieter: moluna, Greven, Deutschland
Kartoniert / Broschiert. Zustand: New. TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also . Artikel-Nr. 447059658
Anzahl: Mehr als 20 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9780764549496_new
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - \* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective\* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS\* Features coverage of the recently revised IETF IDS specification\* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling\* Provides step-by-step instructions for configuration procedures. Artikel-Nr. 9780764549496
Anzahl: 2 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 1st edition. 336 pages. 8.75x7.25x0.75 inches. In Stock. Artikel-Nr. x-0764549499
Anzahl: 2 verfügbar