As the number of corporate, government, and educational networks grows and becomes more connected, so too does the number of attacks on those networks. Stephen Northcutt - original developer of the Shadow intrusion detection system, former head of the Department of Defense's Shadow Intrusion Detection Team, and currently the Chief Information Warfare Officer for the U.S. Ballistic Missile Defense Organization - gives you Network Intrusion Detection: An Analyst's Handbook. Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains unparalleled, practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures. Ideal for the serious security analyst, Network Intrusion Detection: An Analyst's Handbook is the tool that puts you in full control of your network's security. Identify vulnerable targets on your system Mitigate your security risks Recognize common and unusual attack patterns Create effective filters, honey-pots, and firewalls Know and disable your enemies Recognize real detects versus false alarms, and know when to report them Set up your system to avoid false detects Evaluate ID systems and third-party tools Learn about automated response and manual response in relation to real-time analysis Propose and justify ID expenditures to management
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
About the Authors
Stephen Northcutt is a graduate of Mary Washington College. Beforeentering the field of computer security, he worked as a Navy helicopter searchand rescue crewman, white water raft guide, chef, martial arts instructor,cartographer, and network designer. Stephen is author/co-author of IncidentHandling Step by Step, Intrusion Signatures and Analysis, Inside NetworkPerimeter Security, and the previous two editions of this book. He was theoriginal author of the Shadow intrusion detection system and leader of theDepartment of Defense's Shadow Intrusion Detection team before acceptingthe position of Chief for Information Warfare at the Ballistic Missile DefenseOrganization. Stephen currently serves as Director of Training and Certificationfor the SANS Institute.
Judy Novak is currently a senior security analyst working for theBaltimore-based consulting firm of Jacob and Sundstrom, Inc. She primarily worksat the Johns Hopkins University Applied Physics Laboratory where she is involvedin intrusion detection and traffic monitoring and Information Operationsresearch. Judy was one of the founding members of the Army Research LabsComputer Incident Response Team where she worked for three years. She hascontributed to the development of a SANS course in TCP/IP and written a SANShands-on course, "Network Traffic Analysis Using tcpdump," both ofwhich are used in SANS certifications tracks. Judy is a graduate of theUniversity of Maryland―home of the 2002 NCAA basketball champions. She isan aging, yet still passionate, bicyclist, and Lance Armstrong is her modern-dayhero!
© Copyright Pearson Education. All rights reserved.
Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains unparalleled, practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures. Ideal for the serious security analyst, Network Intrusion Detection: An Analyst's Handbook is the tool that puts you in full control of your network's security.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 5,34 expédition depuis Royaume-Uni vers France
Destinations, frais et délaisVendeur : WorldofBooks, Goring-By-Sea, WS, Royaume-Uni
Paperback. Etat : Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. N° de réf. du vendeur GOR001649486
Quantité disponible : 1 disponible(s)
Vendeur : Bahamut Media, Reading, Royaume-Uni
Paperback. Etat : Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. N° de réf. du vendeur 6545-9780735708686
Quantité disponible : 2 disponible(s)
Vendeur : AwesomeBooks, Wallingford, Royaume-Uni
Paperback. Etat : Very Good. Networking Intrusion Detection: An Analyst's Handbook (New Riders Professional Library) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. N° de réf. du vendeur 7719-9780735708686
Quantité disponible : 2 disponible(s)
Vendeur : medimops, Berlin, Allemagne
Etat : very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. N° de réf. du vendeur M00735708681-V
Quantité disponible : 1 disponible(s)
Vendeur : Cotswold Internet Books, Cheltenham, Royaume-Uni
Etat : Used - Very Good. VG paperback. 1st ed. Remainder mark on bottom edge, otherwise a tidy copy in tight binding. N° de réf. du vendeur BOOKS227698I
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
Paperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.6. N° de réf. du vendeur G0735708681I4N00
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
Paperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.6. N° de réf. du vendeur G0735708681I4N00
Quantité disponible : 1 disponible(s)
Vendeur : Wonder Book, Frederick, MD, Etats-Unis
Etat : Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. N° de réf. du vendeur G11J-00983
Quantité disponible : 1 disponible(s)
Vendeur : Wonder Book, Frederick, MD, Etats-Unis
Etat : Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included. N° de réf. du vendeur S13P-00705
Quantité disponible : 2 disponible(s)
Vendeur : More Than Words, Waltham, MA, Etats-Unis
Etat : Good. . . All orders guaranteed and ship within 24 hours. Before placing your order for please contact us for confirmation on the book's binding. Check out our other listings to add to your order for discounted shipping. N° de réf. du vendeur BOS-O-08j-01184
Quantité disponible : 1 disponible(s)