Implementing Intrusion Detection Systems

Implementing Intrusion Detection Systems : A Hands-On Guide for Securing the Network

3.66 (6 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?


Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It features coverage of the recently revised IETF IDS specification. It covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling. It provides step-by-step instructions for configuration procedures.
show more

Product details

  • Paperback | 336 pages
  • 190 x 230 x 28mm | 698.53g
  • Hungry Minds Inc,U.S.
  • Indianapolis, IN, United States
  • English
  • 1. Auflage
  • 0764549499
  • 9780764549496

Back cover copy

Your in-depth guide to implementing and optimizing an effectiveintrusion detection system for your network

Here's the in-the-trenches handbook you've beenlooking for, loaded with information and tips from real casestudies that will help you deploy, configure, and monitor aneffective intrusion detection system. Step-by-step instructionsguide you through the process of configuring identification andauthentication, mandatory and discretionary access control, physical security, and more. You'll get practical knowledgeof honeynets, IP and MAC addressing, log analysis, and IDSstandards, and learn to manage network traffic volume in theIDS.

Tim Crothers gives you the benefit of his own extensiveexperience, furnishing sample IDS deployments and professional tipsthat boost your efficiency. If you're responsible for networksecurity, this is the guidebook that will help you get a goodnight's sleep-at last.

You'll learn how to:

Implement an effective IDS for host, network, and combinedsystemsUnderstand challenges like evasion, unknown attacks, and falsealertsVerify, test, and fine-tune intrusion detection systemsAnalyze various IDS products and determine what meets yourorganization's needsCope with legal issues and architectural challengesIdentify, verify, and respond to different types of attacks andalertsInvestigate security breaches and prevent recurrences
show more

Table of contents

Preface.Acknowledgments.Chapter 1: An Overview of Intrusion Detection.Chapter 2: Network-Based Intrusion Detection Systems.Chapter 3: Host-Based Intrusion Detection.Chapter 4: Handling Alerts.Chapter 5: Coping with Challenges to IDS.Chapter 6: Deploying IDS.Chapter 7: Maximizing Your IDS.Chapter 8: Sample IDS Deployment.Appendix A: Understanding tcpdump Packet Headers.Appendix B: Additional Resources.Appendix C: Glossary.Appendix D: TCP/IP Quick Reference.Appendix E: IDS Product Information.Index.
show more

About Tim Crothers

TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.
show more

Rating details

6 ratings
3.66 out of 5 stars
5 33% (2)
4 17% (1)
3 33% (2)
2 17% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X