Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Intrusion Detection
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Intrusion Detection

Intrusion Detection

Rebecca Gurley Bace - Collection Technology Series

338 pages, parution le 10/12/1999

Résumé

With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever. Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers:
  • practical considerations for selecting and
    implementing intrusion detection systems
  • Methods for handling the results of analysis, and the options for responses to detected problems
  • Data Sources commonly used in intrusion detection and how they influence the capabillitlics of all intrusion detection systems
  • Legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems

More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed discussion of the vulnerabilities inherent in many systems, and approaches to testing systems for these problems. Ideal for the network architect who has to make decisions on what intrusion detection system to implement and how to do it, this book will help you:
  • Understand the history of the technology, as well as how future changes may affect your systems
  • Guide an organization through a full acquisition lifecycle, from initial requirements definition to product deployment
  • Choose your systems' responses to detected problems and tic the results back into the site security management process
  • Assess the quality of a proposed or existing intrusion detection system design

Table of contents


Introduction
1: The History of Intrusion Detection
2: Concepts and Definitions
3: Information Sources
4: Analysis Schemes
5: Responses
6: Vulnerability Analysis: A Special Case
7: Technical Issues
8: Understanding the Real-World Challenge
9: Legal Issues
10: For Users
11: For Strategists
12: For Designers
13: Future Needs
Appendix A: Glossary
Appendix B: Bibliography
Appendix C: Resources
Appendix D: Checklist
Index


L'auteur - Rebecca Gurley Bace

Rebecca Gurley Bace

is the President of Infidel, Inc., a consulting practice specializing in intrusion detection and network security technology and strategy. Prior to founding Infidel, Ms. Bace spent thirteen years in gowrnment, the first twelve as an employee of the National Security Agency. She led the Computer Misuse and Anomaly Detection (CMAD) Research program from 1989 through 1995, as a charter member of NSA's Office of Information Security Research and Technology (R2). As the leader of CMAD research, Ms. Bace championed much of the early research in Intrusion Detection, sponsoring academic research at Purdue University (COAST project), the University of California, Davis (Security Lab), University of New Mexico, and Tulane University.

Caractéristiques techniques

  PAPIER
Éditeur(s) Macmillan
Auteur(s) Rebecca Gurley Bace
Collection Technology Series
Parution 10/12/1999
Nb. de pages 338
Format 19 x 24
Couverture Relié
Poids 850g
EAN13 9781578701858

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription