Home
»
Implementing Intrusion Detection Systems
A01=Tim Crothers
Author_Tim Crothers
case
Category=URY
Category=UTN
configuring
detection
effective
eq_bestseller
eq_computing
eq_isMigrated=1
eq_nobargain
eq_non-fiction
guide
handbook
identification
indepth
information
instructions
inthetrenches
intrusion
knowledge
network
practical
process
real
stepbystep
studies
system
Product details
- ISBN 9780764549496
- Weight: 494g
- Dimensions: 191 x 235mm
- Publication Date: 13 Dec 2002
- Publisher: John Wiley & Sons Inc
- Publication City/Country: US
- Product Form: Paperback
Delivery/Collection within 10-20 working days
Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock
10-20 Working Days: On Backorder
Will Deliver When Available: On Pre-Order or Reprinting
We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!
* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures
TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.
Qty:
