Network Intrusion Detection

Front Cover
Sams Publishing, 2002 - Computers - 490 pages
5 Reviews

The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters.

  

What people are saying - Write a review

User ratings

5 stars
0
4 stars
2
3 stars
2
2 stars
0
1 star
1

User Review - Flag as inappropriate

http://sodaphish.com/files/ebks/try2innovate.com/downloads/E-books/Networking/Network%20Intrusion%20Detection,%20Third%20Edition.pdf

User Review - Flag as inappropriate

Found a typo in page 30 of Second Edition. telnet.com should be tclient.net.

Contents

I
3
II
4
III
7
IV
11
V
15
VI
16
VII
18
VIII
19
LXXVI
238
LXXVII
240
LXXVIII
248
LXXIX
249
LXXX
250
LXXXII
266
LXXXIII
269
LXXXIV
273

IX
20
X
23
XI
24
XII
31
XIII
38
XIV
42
XV
43
XVI
44
XVII
53
XVIII
56
XIX
57
XX
58
XXI
61
XXII
65
XXIII
69
XXIV
76
XXV
78
XXVI
79
XXVII
81
XXVIII
88
XXIX
92
XXX
101
XXXI
103
XXXII
104
XXXIII
115
XXXIV
119
XXXV
122
XXXVI
125
XXXVII
127
XXXVIII
129
XXXIX
131
XL
133
XLII
135
XLIII
137
XLIV
139
XLV
142
XLVI
143
XLVIII
147
XLIX
151
L
159
LI
161
LIII
178
LIV
181
LV
183
LVI
185
LVII
186
LVIII
189
LIX
194
LX
197
LXI
200
LXII
203
LXIII
204
LXV
205
LXVI
210
LXVII
218
LXVIII
221
LXIX
222
LXX
224
LXXI
227
LXXII
229
LXXIII
231
LXXIV
236
LXXV
237
LXXXV
274
LXXXVI
285
LXXXVII
286
LXXXVIII
288
LXXXIX
289
XC
290
XCI
291
XCII
292
XCIII
294
XCIV
296
XCV
298
XCVI
300
XCVII
303
XCVIII
304
XCIX
307
C
308
CI
311
CII
312
CIII
316
CIV
318
CV
319
CVI
320
CVII
324
CVIII
326
CIX
332
CX
336
CXII
338
CXIII
339
CXIV
341
CXV
347
CXVI
349
CXVII
358
CXVIII
359
CXIX
361
CXX
367
CXXI
372
CXXII
377
CXXIII
378
CXXIV
379
CXXVI
383
CXXVII
388
CXXVIII
392
CXXIX
396
CXXX
401
CXXXII
409
CXXXIII
413
CXXXIV
417
CXXXV
423
CXXXVI
425
CXXXVII
426
CXXXVIII
430
CXXXIX
433
CXL
435
CXLI
438
CXLII
439
CXLIII
440
CXLIV
450
CXLV
452
CXLVI
457
CXLVII
460
CXLVIII
464
CXLIX
465
Copyright

Common terms and phrases

Popular passages

Page xiv - If any of you lacks wisdom, let him ask of God, who gives to all liberally and without reproach, and it will be given to him.
Page xii - Northcutt is a graduate of Mary Washington College. Before entering the field of computer security, he worked as a Navy helicopter search and rescue crewman, white water raft guide, chef, martial arts instructor, cartographer, and network designer.

References to this book

All Book Search results »

About the author (2002)

About the Authors

Stephen Northcutt is a graduate of Mary Washington College. Beforeentering the field of computer security, he worked as a Navy helicopter searchand rescue crewman, white water raft guide, chef, martial arts instructor,cartographer, and network designer. Stephen is author/co-author of IncidentHandling Step by Step, Intrusion Signatures and Analysis, Inside NetworkPerimeter Security, and the previous two editions of this book. He was theoriginal author of the Shadow intrusion detection system and leader of theDepartment of Defense's Shadow Intrusion Detection team before acceptingthe position of Chief for Information Warfare at the Ballistic Missile DefenseOrganization. Stephen currently serves as Director of Training and Certificationfor the SANS Institute.

Judy Novak is currently a senior security analyst working for theBaltimore-based consulting firm of Jacob and Sundstrom, Inc. She primarily worksat the Johns Hopkins University Applied Physics Laboratory where she is involvedin intrusion detection and traffic monitoring and Information Operationsresearch. Judy was one of the founding members of the Army Research LabsComputer Incident Response Team where she worked for three years. She hascontributed to the development of a SANS course in TCP/IP and written a SANShands-on course, "Network Traffic Analysis Using tcpdump," both ofwhich are used in SANS certifications tracks. Judy is a graduate of theUniversity of Maryland?home of the 2002 NCAA basketball champions. She isan aging, yet still passionate, bicyclist, and Lance Armstrong is her modern-dayhero!


Copyright Pearson Education. All rights reserved.

Bibliographic information