Intrusion Detection & Prevention
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Security Systems' Black ICE & RealSecure, Cisco Systems' Secure IDS, Computer Associates’ eTrust, Entercept, and the open source Snort tool.
1 page matching "target monitoring systems" "cryptographic algorithm" in this book
What people are saying - Write a review
We haven't found any reviews in the usual places.
Crash Course in the Internet Protocol Suite
Unauthorized Activity I
Unauthorized Activity II
17 other sections not shown
agents alert allow analysis analyze application architecture backend buffer overflow bytes capability capture Chapter checksum Cisco cleartext command configuration connection create data correlation database default deployed deployment destination detection and prevention encrypted Ethernet example exploit filter firewalls flag fragments function hacker hardware address host host-based ICMP IDS and IPS IDS or IPS IDS/IPS IDSs and IPSs implementation input installation interface Internet intrusion detection intrusion prevention intrusion-detection intrusion-detection system intrusion-prevention intrusion-prevention systems IP address IP header layer libpcap Linux matching monitoring network traffic operating system options organization output packet filters perform port protocol provides RealSecure response router rules scans sensors Sentivist sequence number server SNMP Snort specific spoofed SYN flood tcpdump telnet tion Unix upgrade variables vulnerability Web Farm web server Windows worm