
Intrusion Detection
Rebecca Gurley Bace - Collection Technology Series
Résumé
- practical considerations for selecting and
implementing intrusion detection systems
- Methods for handling the results of analysis, and the
options for responses to detected problems
- Data Sources commonly used in intrusion detection and
how they influence the capabillitlics of all intrusion
detection systems
- Legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems
More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed discussion of the vulnerabilities inherent in many systems, and approaches to testing systems for these problems. Ideal for the network architect who has to make decisions on what intrusion detection system to implement and how to do it, this book will help you:
- Understand the history of the technology, as well as
how future changes may affect your systems
- Guide an organization through a full acquisition
lifecycle, from initial requirements definition to product
deployment
- Choose your systems' responses to detected problems and
tic the results back into the site security management
process
- Assess the quality of a proposed or existing intrusion detection system design
Table of contents
- Introduction
- 1: The History of Intrusion Detection
- 2: Concepts and Definitions
- 3: Information Sources
- 4: Analysis Schemes
- 5: Responses
- 6: Vulnerability Analysis: A Special Case
- 7: Technical Issues
- 8: Understanding the Real-World Challenge
- 9: Legal Issues
- 10: For Users
- 11: For Strategists
- 12: For Designers
- 13: Future Needs
- Appendix A: Glossary
- Appendix B: Bibliography
- Appendix C: Resources
- Appendix D: Checklist
- Index
L'auteur - Rebecca Gurley Bace
is the President of Infidel, Inc., a consulting practice specializing in intrusion detection and network security technology and strategy. Prior to founding Infidel, Ms. Bace spent thirteen years in gowrnment, the first twelve as an employee of the National Security Agency. She led the Computer Misuse and Anomaly Detection (CMAD) Research program from 1989 through 1995, as a charter member of NSA's Office of Information Security Research and Technology (R2). As the leader of CMAD research, Ms. Bace championed much of the early research in Intrusion Detection, sponsoring academic research at Purdue University (COAST project), the University of California, Davis (Security Lab), University of New Mexico, and Tulane University.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Macmillan |
Auteur(s) | Rebecca Gurley Bace |
Collection | Technology Series |
Parution | 10/12/1999 |
Nb. de pages | 338 |
Format | 19 x 24 |
Couverture | Relié |
Poids | 850g |
EAN13 | 9781578701858 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse