Intrusion Signatures And Analysis
Par : , , ,Formats :
Définitivement indisponible
Cet article ne peut plus être commandé sur notre site (ouvrage épuisé ou plus commercialisé). Il se peut néanmoins que l'éditeur imprime une nouvelle édition de cet ouvrage à l'avenir. Nous vous invitons donc à revenir périodiquement sur notre site.
- Nombre de pages408
- PrésentationBroché
- Poids0.71 kg
- Dimensions17,9 cm × 22,8 cm × 2,4 cm
- ISBN0-7357-1063-5
- EAN9780735710634
- Date de parution30/10/2001
- ÉditeurNew Riders
Résumé
Security analysts are often responsible for the livelihood of a
business. We all know that information is power. If you find
yourself at a loss in determining what is happening to your
network or if you often find yourself chasing false positives,
help is here.
Finally, a reference that moves beyond the theories of
intrusion detection on to a full analysis of an attack, along
with traces to determine what happened and how. Intrusion
Signatures and Analysis provides a 10-step walkthrough for
every trace covered, which teaches you an intrusion analysis
methodology. There is no other book on the market so
focused on teaching pragmatic log analysis.
You cannot do intrusion analysis effectively without this book!
Security analysts are often responsible for the livelihood of a
business. We all know that information is power. If you find
yourself at a loss in determining what is happening to your
network or if you often find yourself chasing false positives,
help is here.
Finally, a reference that moves beyond the theories of
intrusion detection on to a full analysis of an attack, along
with traces to determine what happened and how. Intrusion
Signatures and Analysis provides a 10-step walkthrough for
every trace covered, which teaches you an intrusion analysis
methodology. There is no other book on the market so
focused on teaching pragmatic log analysis.
You cannot do intrusion analysis effectively without this book!