As the number of corporate, government, and educational networks grows and becomes more connected, so too does the number of attacks on those networks. Stephen Northcutt - original developer of the Shadow intrusion detection system, former head of the Department of Defense's Shadow Intrusion Detection Team, and currently the Chief Information Warfare Officer for the U.S. Ballistic Missile Defense Organization - gives you Network Intrusion Detection: An Analyst's Handbook. Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains unparalleled, practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures. Ideal for the serious security analyst, Network Intrusion Detection: An Analyst's Handbook is the tool that puts you in full control of your network's security. Identify vulnerable targets on your system Mitigate your security risks Recognize common and unusual attack patterns Create effective filters, honey-pots, and firewalls Know and disable your enemies Recognize real detects versus false alarms, and know when to report them Set up your system to avoid false detects Evaluate ID systems and third-party tools Learn about automated response and manual response in relation to real-time analysis Propose and justify ID expenditures to management
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
About the Authors
Stephen Northcutt is a graduate of Mary Washington College. Beforeentering the field of computer security, he worked as a Navy helicopter searchand rescue crewman, white water raft guide, chef, martial arts instructor,cartographer, and network designer. Stephen is author/co-author of IncidentHandling Step by Step, Intrusion Signatures and Analysis, Inside NetworkPerimeter Security, and the previous two editions of this book. He was theoriginal author of the Shadow intrusion detection system and leader of theDepartment of Defense's Shadow Intrusion Detection team before acceptingthe position of Chief for Information Warfare at the Ballistic Missile DefenseOrganization. Stephen currently serves as Director of Training and Certificationfor the SANS Institute.
Judy Novak is currently a senior security analyst working for theBaltimore-based consulting firm of Jacob and Sundstrom, Inc. She primarily worksat the Johns Hopkins University Applied Physics Laboratory where she is involvedin intrusion detection and traffic monitoring and Information Operationsresearch. Judy was one of the founding members of the Army Research LabsComputer Incident Response Team where she worked for three years. She hascontributed to the development of a SANS course in TCP/IP and written a SANShands-on course, "Network Traffic Analysis Using tcpdump," both ofwhich are used in SANS certifications tracks. Judy is a graduate of theUniversity of Maryland―home of the 2002 NCAA basketball champions. She isan aging, yet still passionate, bicyclist, and Lance Armstrong is her modern-dayhero!
© Copyright Pearson Education. All rights reserved.
Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains unparalleled, practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures. Ideal for the serious security analyst, Network Intrusion Detection: An Analyst's Handbook is the tool that puts you in full control of your network's security.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : World of Books (was SecondSale), Montgomery, IL, Etats-Unis
Etat : Good. Item in good condition and has highlighting/writing on text. Used texts may not contain supplemental items such as CDs, info-trac etc. N° de réf. du vendeur 00102345062
Quantité disponible : 1 disponible(s)
Vendeur : Better World Books, Mishawaka, IN, Etats-Unis
Etat : Very Good. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. N° de réf. du vendeur 5645337-75
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
Paperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. N° de réf. du vendeur G0735708681I4N00
Quantité disponible : 1 disponible(s)
Vendeur : Better World Books Ltd, Dunfermline, Royaume-Uni
Etat : Very Good. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. N° de réf. du vendeur 5645337-75
Quantité disponible : 1 disponible(s)
Vendeur : WorldofBooks, Goring-By-Sea, WS, Royaume-Uni
Paperback. Etat : Very Good. Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains unparalleled, practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures. Ideal for the serious security analyst, Network Intrusion Detection: An Analyst's Handbook is the tool that puts you in full control of your network's security. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. N° de réf. du vendeur GOR001649486
Quantité disponible : 2 disponible(s)
Vendeur : medimops, Berlin, Allemagne
Etat : very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. N° de réf. du vendeur M00735708681-V
Quantité disponible : 1 disponible(s)
Vendeur : Cotswold Internet Books, Cheltenham, Royaume-Uni
Etat : Used - Very Good. VG paperback. 1st ed. Remainder mark on bottom edge, otherwise a tidy copy in tight binding Used - Very Good. VG paperback. N° de réf. du vendeur BOOKS227698I
Quantité disponible : 1 disponible(s)
Vendeur : Ammareal, Morangis, France
Softcover. Etat : Très bon. Couverture différente. Edition 1999. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Different cover. Edition 1999. Ammareal gives back up to 15% of this item's net price to charity organizations. N° de réf. du vendeur G-982-777
Quantité disponible : 1 disponible(s)
Vendeur : GoldBooks, Denver, CO, Etats-Unis
Paperback. Etat : new. New Copy. Customer Service Guaranteed. N° de réf. du vendeur 76P44_29_0735708681
Quantité disponible : 1 disponible(s)