Table of Contents


protect your information with intrusion detection
Protect Your Information with Intrusion Detection
by Alex Lukatsky ISBN:1931769117
A-LIST Publishing 2003 (536 pages)

Answers on What, Where, and How to detect intrusion and what is necessary to build a system and make a network’s configuration effective, as well as how to react to attacks after they have been detected.

Table of Contents
Protect Your Information with Intrusion Detection
Introduction
Chapter 1 - Introduction to Intrusion Detection
Chapter 2 - Anatomy of an Attack
Chapter 3 - Introduction to Intrusion Detection
Chapter 4 - The Three Basic Principles of Intrusion Detection
Chapter 5 - Detecting Attack Traces
Chapter 6 - Classification of Intrusion Detection Systems
Chapter 7 - Anticipating Attacks, or Creating an Intrusion Detection Infrastructure
Chapter 8 - The Life Cycle, Deployment, and Implementation of an IDS
Chapter 9 - Selecting an Intrusion Detection System
Chapter 10 - Placement of the Intrusion Detection System
Chapter 11 - Using Intrusion Detection Systems
Chapter 12 - Common IDS Problems
Chapter 13 - Standardization in the Field of Intrusion Detection
Chapter 14 - Incident Response
Appendix A - List of Ports Frequently Used by Trojans
Appendix B - List of Most Frequently Scanned Ports
Appendix C - List of Internet Address Ranges
Appendix D - List of First-Level Domains
Appendix E - List of Protocol Identifiers for IPv4
Bibliography
Index
List of Figures
List of Tables
List of Code Examples
List of Sidebars



Protect Your Information with Intrusion Detection
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net