Skip to main content

Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network

Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network

Tim Crothers

ISBN: 978-0-764-54949-6

Dec 2002

336 pages

Select type: Paperback

In Stock

$55.00

Description

* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures
Preface.

Acknowledgments.

Chapter 1: An Overview of Intrusion Detection.

Chapter 2: Network-Based Intrusion Detection Systems.

Chapter 3: Host-Based Intrusion Detection.

Chapter 4: Handling Alerts.

Chapter 5: Coping with Challenges to IDS.

Chapter 6: Deploying IDS.

Chapter 7: Maximizing Your IDS.

Chapter 8: Sample IDS Deployment.

Appendix A: Understanding tcpdump Packet Headers.

Appendix B: Additional Resources.

Appendix C: Glossary.

Appendix D: TCP/IP Quick Reference.

Appendix E: IDS Product Information.

Index.