Implementing Intrusion Detection Systems

Regular price €52.99
Title
A01=Tim Crothers
Author_Tim Crothers
case
Category=URY
Category=UTN
configuring
detection
effective
eq_bestseller
eq_computing
eq_isMigrated=1
eq_nobargain
eq_non-fiction
guide
handbook
identification
indepth
information
instructions
inthetrenches
intrusion
knowledge
network
practical
process
real
stepbystep
studies
system

Product details

  • ISBN 9780764549496
  • Weight: 494g
  • Dimensions: 191 x 235mm
  • Publication Date: 13 Dec 2002
  • Publisher: John Wiley & Sons Inc
  • Publication City/Country: US
  • Product Form: Paperback
Delivery/Collection within 10-20 working days

Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock

10-20 Working Days: On Backorder

Will Deliver When Available: On Pre-Order or Reprinting

We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!

* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures
TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.