Cisco Secure Intrusion Detection System (Hardcover)
$399Solaris Internals: Core Kernel Architecture
$299Hack Proofing Linux: A Guide to Open Source Security
$399RHCE Red Hat Certified Engineer LINUX Study Guide, 2/e
$299Component Development for the Java Platform (Paperback)
$199Itanium Rising: Breaking Through Moore's Second Law of Computing Power
$399Enterprise JavaBeans, 4/e (Paperback)
Implement network surveillance system for 24-hour security with the official CSIDS Coursebook.
- The only book that concentrates solely on implementation of Cisco Secure Intrusion Detection Systems.
- Full of configuration techniques and security management details.
- Based on officially developed course materials from Cisco Systems.
Earl Carter is a Security Research Engineer and member of the Security Technologies Assessment Team (STAT) for Cisco Systems, Inc. where he performs security evaluations on numerous Cisco products including everything from the PIX Firewall to Atliga and other VPN solutions to Cisco CallManager. The STAT team developed the initial prototype that has evolved into the current Gigabit IDS solution. Earl started with Cisco doing research for Cisco Secure IDS (formerly NetRanger) and Cisco Secure Scanner (formerly NetSonar). Earl began learning about computer security at the Air Force Information Warfare Center, where his primary responsibility was the securing of Air Force networks against attacks. Earl has a Bachelor of Science from the University of Texas at San Antonio, and he is currently working on attaining his CCNP certification.
Table of Contents
I. INTRODUCTION TO NETWORK SECURITY.
2. Cisco Security Wheel.
II. INTRUSION DETECTION AND THE CSIDS ENVIRONMENT.
4. Cisco Secure IDS Overview.
III. CSIDS INSTALLATION.
6. Cisco Secure Policy Manager Installation.
7. 4200 Series Sensor Installation Within CSPM.
IV. ALARM MANAGEMENT AND INTRUSION DETECTION SIGNATURES.
9. Understanding Cisco Secure IDS Signatures.
10. Signature Series.
V. CSIDS CONFIGURATION.
12. Signature and Intrusion Detection Configuration.
13. IP Blocking Configurations.
14. Catalyst 6000 IDS Module Configuration.
VI. CISCO SECURE INTRUSION DETECTION DIRECTOR (CSIDD).
16. The Configuration File Management Utility (nrConfigure).
17. Cisco IOS Firewall Intrusion Detection System.
VII. CISCO SECURE IDS UPCOMING RELEASES.
Appendix B: Cisco Secure IDS Architecture.
Appendix C: Cisco Secure ID Director Basic Troubleshooting.
Appendix D: Cisco Secure IDS Log Files.
Appendix E: Advanced Tips 749.
Appendix F: Cisco Secure IDS Signature Structures and Implementations.
Appendix G: Cisco Secure IDS Signatures and Recommended Alarm Levels.
Appendix H: Cisco IOS Firewall IDS Signature List.
Appendix I: Cisco Secure Communications Deployment Worksheet.
Appendix J: Glossary.
Appendix K: Answers to Review Questions.