Intrusion Signatures And Analysis

Par : Karen Frederick, Stephen Northcutt, Mark Cooper, Matt Fearnow

Formats :

Définitivement indisponible
Cet article ne peut plus être commandé sur notre site (ouvrage épuisé ou plus commercialisé). Il se peut néanmoins que l'éditeur imprime une nouvelle édition de cet ouvrage à l'avenir. Nous vous invitons donc à revenir périodiquement sur notre site.
  • Nombre de pages408
  • PrésentationBroché
  • Poids0.71 kg
  • Dimensions17,9 cm × 22,8 cm × 2,4 cm
  • ISBN0-7357-1063-5
  • EAN9780735710634
  • Date de parution30/10/2001
  • ÉditeurNew Riders

Résumé

Security analysts are often responsible for the livelihood of a business. We all know that information is power. If you find yourself at a loss in determining what is happening to your network or if you often find yourself chasing false positives, help is here. Finally, a reference that moves beyond the theories of intrusion detection on to a full analysis of an attack, along with traces to determine what happened and how. Intrusion Signatures and Analysis provides a 10-step walkthrough for every trace covered, which teaches you an intrusion analysis methodology. There is no other book on the market so focused on teaching pragmatic log analysis. You cannot do intrusion analysis effectively without this book!
Security analysts are often responsible for the livelihood of a business. We all know that information is power. If you find yourself at a loss in determining what is happening to your network or if you often find yourself chasing false positives, help is here. Finally, a reference that moves beyond the theories of intrusion detection on to a full analysis of an attack, along with traces to determine what happened and how. Intrusion Signatures and Analysis provides a 10-step walkthrough for every trace covered, which teaches you an intrusion analysis methodology. There is no other book on the market so focused on teaching pragmatic log analysis. You cannot do intrusion analysis effectively without this book!