Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the NetworkISBN: 978-0-7645-4949-6
Paperback
336 pages
December 2002
This is a Print-on-Demand title. It will be printed specifically to fill your order. Please allow an additional 10-15 days delivery time. The book is not returnable.
|
Preface.
Acknowledgments.
Chapter 1: An Overview of Intrusion Detection.
Chapter 2: Network-Based Intrusion Detection Systems.
Chapter 3: Host-Based Intrusion Detection.
Chapter 4: Handling Alerts.
Chapter 5: Coping with Challenges to IDS.
Chapter 6: Deploying IDS.
Chapter 7: Maximizing Your IDS.
Chapter 8: Sample IDS Deployment.
Appendix A: Understanding tcpdump Packet Headers.
Appendix B: Additional Resources.
Appendix C: Glossary.
Appendix D: TCP/IP Quick Reference.
Appendix E: IDS Product Information.
Index.
Acknowledgments.
Chapter 1: An Overview of Intrusion Detection.
Chapter 2: Network-Based Intrusion Detection Systems.
Chapter 3: Host-Based Intrusion Detection.
Chapter 4: Handling Alerts.
Chapter 5: Coping with Challenges to IDS.
Chapter 6: Deploying IDS.
Chapter 7: Maximizing Your IDS.
Chapter 8: Sample IDS Deployment.
Appendix A: Understanding tcpdump Packet Headers.
Appendix B: Additional Resources.
Appendix C: Glossary.
Appendix D: TCP/IP Quick Reference.
Appendix E: IDS Product Information.
Index.