Network Intrusion Detection, 3/e
- 出版商: Sams Publishing
- 出版日期: 2002-09-06
- 售價: $1,877
- 貴賓價: 9.5 折 $1,783
- 語言: 英文
- 頁數: 512
- 裝訂: Paperback
- ISBN: 0735712654
- ISBN-13: 9780735712652
貴賓價: $998Fundamentals of Data Structures in C
貴賓價: $1,140Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
貴賓價: $2,207Data Mining: Concepts and Techniques
貴賓價: $1,093Database System Concepts, 5/e (IE) (美國版ISBN:0072958863)
貴賓價: $3,990High-Speed Signal Propagation: Advanced Black Magic (Hardcover)(美國原版)
貴賓價: $1,235Computer Architecture: A Quantitative Approach, 3/e(精裝本)
售價: $199Cisco CCNA Exam #640-607 Certification Guide, 3/e
貴賓價: $998Operating System Concepts, 6/e (Windows XP Update)
The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network.
- Written by two of America's most important computer security experts.
- Unparalleled advice and technical content, reviewed by the top names in network security.
- Timing coincides with rising interest in intrusion detection.
Stephen Northcutt is a graduate of Mary Washington College. Before entering the field of computer security, he worked as a cook, a US Navy helicopter search and rescue crewman, a martial arts instructor, cartographer, and network designer. He is the author of Incident Handling Step by Step and Intrusion Detection — Shadow Style, both published by the SANS Institute. He was the original developer of the Shadow intrusion detection system and served as the leader of the Department of Defense's Shadow Intrusion Detection Team for two years. Formerly the Director of the U.S. Navy's Information System Security Office at the Naval Security Warfare Center, he is now Chief Information Warfare Officer for the Ballistic Missile Defense Organization at the DOD. He is a featured lecturer and co-chair of the SANS conference. Judy Novak is a Senior Security Analyst for the Army Research Laboratory. She is one of the founding members of the Computer and Security Incident Response Team that is highly regarded among the military. She has assisted in deploying intrusion detection tools and monitoring at many different military and government sites. She is an author and speaker for the SANS Institute on TCP/IP and using the Shadow intrusion detection tool for network analysis.
Table of Contents
2. Introduction to TCPdump and TCP.
5. Stimulus and Response.
II. TRAFFIC ANALYSIS.
8. Examining IP Header Fields.
9. Examining Embedded Protocol Header Fields.
10. Real-World Analysis.
11. Mystery Traffic.
III. FILTERS/RULES FOR NETWORK MONITORING.
13. Introduction to Snort and Snort Rules.
14. Snort Rules-Part II.
IV. INTRUSION INFRASTRUCTURE.
16. Architectural Issues.
17. Organizational Issues.
18. Automated and Manual Response.
19. Business Case for Intrusion Detection.
20. Future Directions.
Appendix B. Denial of Service.
Appendix Ctection of Intelligence Gathering.