Practical Intrusion Analysis: Prevention and Detection for the TwentyFirst Century: Prevention and Detection for the TwentyFir,Used

Practical Intrusion Analysis: Prevention and Detection for the TwentyFirst Century: Prevention and Detection for the TwentyFir,Used

In Stock
SKU: SONG0321591801
Brand: Addison-Wesley Professional
Regular price$16.62
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.Nate Miller, Cofounder, Stratum SecurityThe Only Definitive Guide to New StateoftheArt Techniques in Intrusion Detection and PreventionRecently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the fields leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers.Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing todays new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more.Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includesAssessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zeroday exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers geographical fingerprints and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternativesIncludes contributions from these leading network security experts:Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhiskerSeth Fogie, CEO, Airscanner USA; leadingedge mobile security researcher; coauthor of Security WarriorDr. Sushil Jajodia, Director, Center for Secure Information Systems; founding EditorinChief, Journal of Computer SecurityDr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason UniversityAlex Kirk, Member, Sourcefire Vulnerability Research Team

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

Recently Viewed