Import It All
Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century

Product ID: 18117357 Condition: New

Payflex: Pay in 4 interest-free payments of R415.50. Learn more
R 1,662
includes Duties & VAT
Delivery: 10-20 working days
Ships from USA warehouse.
Secure Transaction
VISA Mastercard payflex ozow

Product Description

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century

<P style="MARGIN: 0px">“<I>Practical Intrusion Analysis </I>provides a solid fundamental overview of the art and science of intrusion analysis.”</P> <P style="MARGIN: 0px">   –Nate Miller, Cofounder, Stratum Security</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px"> <B>The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention</B> </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In <I>Practical Intrusion Analysis</I>, one of the field’s leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today’s new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more.</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes</P> <P style="MARGIN: 0px"> </P> <UL> <LI> <DIV style="MARGIN: 0px">Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies</DIV> <LI> <DIV style="MARGIN: 0px">Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions</DIV> <LI> <DIV style="MARGIN: 0px">Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks</DIV> <LI> <DIV style="MARGIN: 0px">Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls</DIV> <LI> <DIV style="MARGIN: 0px">Implementing IDS/IPS systems that protect wireless data traffic</DIV> <LI> <DIV style="MARGIN: 0px">Enhancing your intrusion detection efforts by converging with physical security defenses</DIV> <LI> <DIV style="MARGIN: 0px">Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively</DIV> <LI> <DIV style="MARGIN: 0px">Visualizing data traffic to identify suspicious patterns more quickly</DIV> <LI> <DIV style="MARGIN: 0px">Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives </DIV> </LI> </UL> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Includes contributions from these leading network security experts: </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker </P> <P style="MARGIN: 0px"> <BR>Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of <I>Security Warrior</I> </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, <I>Journal of Computer Security</I> </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Alex Kirk, Member, Sourcefire Vulnerability Research Team</P> <P style="MARGIN: 0px"> </P>

Technical Specifications

Country
USA
Brand
ADDISON-WESLEY
Manufacturer
Addison-Wesley Professional
Binding
Paperback
ItemPartNumber
Illustrations
Model
Illustrations
ReleaseDate
2009-07-04T00:00:01Z
UnitCount
1
EANs
9780321591807

You might also like

Back to top