Intrusion Detection

Front Cover
Sams Publishing, 2000 - Computers - 339 pages
1 Review

With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever. Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers: practical considerations for selecting and implementing intrusion detection systems; methods of handling the results of analysis, and the options for responses to detected problems, data sources commonly used in intrusion detection and how they influence the capabilities of all intrusion detection systems; legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems. More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed discussion of the vulnerabilities inherent in many systems, and approaches to testing systems for these problems.

 

What people are saying - Write a review

LibraryThing Review

User Review  - jaygheiser - LibraryThing

This is a well-researched and well-written text. It is an excellent complement to Northcutt's book, which is more concrete and oriented to the hands-on practitioner. Those wishing to just buy an IDS and turn it on may find Bace's book somewhat abstract. Read full review

Contents

I
1
II
3
III
4
IV
7
VII
9
IX
10
X
11
XI
12
CLXV
181
CLXVI
185
CLXVIII
186
CLXX
187
CLXXI
191
CLXXIV
192
CLXXVI
194
CLXXVIII
195

XIII
14
XIV
15
XV
21
XVI
23
XVII
24
XVIII
25
XIX
27
XXI
28
XXIII
29
XXV
30
XXVII
31
XXVIII
32
XXIX
33
XXX
35
XXXI
37
XXXIII
38
XXXV
40
XXXVII
42
XXXVIII
43
XL
44
XLI
45
XLIV
46
XLVI
47
XLVIII
48
L
49
LII
57
LIII
58
LIV
60
LV
65
LVI
67
LIX
68
LX
70
LXI
73
LXIII
74
LXV
75
LXVI
76
LXVIII
77
LXIX
79
LXXIII
80
LXXIV
81
LXXV
82
LXXVI
83
LXXVII
84
LXXVIII
88
LXXIX
89
LXXX
91
LXXXII
100
LXXXIII
110
LXXXIV
117
LXXXVI
121
LXXXIX
123
XCI
124
XCIII
125
XCV
128
XCVI
130
XCIX
131
CI
132
CIV
133
CVI
134
CVII
135
CIX
136
CXII
140
CXIV
141
CXVI
142
CXVII
144
CXXI
145
CXXIII
147
CXXIV
149
CXXVI
150
CXXVIII
151
CXXXI
152
CXXXIII
153
CXXXV
155
CXXXVI
156
CXXXVII
157
CXXXIX
158
CXL
159
CXLII
160
CXLIV
161
CXLV
162
CXLVI
163
CXLVII
164
CXLVIII
165
CLI
166
CLIII
167
CLIV
169
CLVI
171
CLVIII
172
CLX
173
CLXIII
174
CLXIV
178
CLXXX
196
CLXXXI
197
CLXXXII
198
CLXXXIII
199
CLXXXIV
201
CLXXXV
203
CLXXXVII
204
CLXXXVIII
205
CXC
206
CXCI
207
CXCIII
208
CXCVI
209
CXCVII
212
CXCVIII
214
CXCIX
215
CC
216
CCI
217
CCV
218
CCVII
219
CCVIII
220
CCX
221
CCXII
222
CCXIII
223
CCXIV
224
CCXVII
225
CCXX
226
CCXXI
227
CCXXIV
228
CCXXVI
229
CCXXVII
230
CCXXVIII
231
CCXXX
232
CCXXXII
233
CCXXXIII
235
CCXXXVI
236
CCXXXIX
237
CCXL
238
CCXLI
239
CCXLII
241
CCXLIII
242
CCXLVI
243
CCXLVIII
244
CCL
245
CCLII
246
CCLV
247
CCLVII
248
CCLVIII
249
CCLIX
250
CCLXII
251
CCLXIV
252
CCLXVI
253
CCLXVII
255
CCLXIX
256
CCLXXI
258
CCLXXII
260
CCLXXIII
262
CCLXXV
263
CCLXXVIII
264
CCLXXX
265
CCLXXXIV
266
CCLXXXV
267
CCLXXXVI
268
CCLXXXVIII
269
CCXC
270
CCXCI
271
CCXCIII
272
CCXCVII
273
CCCI
274
CCCII
275
CCCIV
276
CCCVII
277
CCCXI
278
CCCXIII
279
CCCXVI
281
CCCXVII
282
CCCXX
283
CCCXXIII
284
CCCXXIV
285
CCCXXVII
286
CCCXXIX
287
CCCXXX
289
CCCXXXII
297
CCCXXXIV
315
CCCXXXIX
316
CCCXLIII
317
CCCXLVIII
318
CCCLI
319
CCCLIV
320
CCCLV
321
CCCLVI
323
Copyright

Common terms and phrases

References to this book

All Book Search results »

About the author (2000)

Rebecca Gurley Bace is President of Infidel, Inc., a consulting practice specializing in intrusion detection and network security technology and strategy.

Bibliographic information