|Table of Contents|
Protect Your Information with Intrusion Detection contains a detailed overview of the new technology in information protection--intrusion detection. This is a comprehensive handbook introducing the reader to the problem of intrusion detection, exploring the main concepts and principals of intrusion detection technology, and giving an in-depth classification of intrusion detection systems (IDS).In this book, often-unorganized information on ways of attacking is systematized, the criteria and signs that indicate an attack are covered, and information sources and analysis methods are also described.
This book is not a collection of after-action reports on a variety of network attacks. It describes the concepts and principals of intrusion detection technology. The main focus is a practical implementation of intrusion detection systems (IDS) and vulnerability analysis.
The author describes how to choose an IDS for various types of companies. The book also covers the implementation and technical support of an IDS. After reading this book, you will find answers on What, Where, and How to detect; what is necessary to build an intrusion detection system and make a network’s configuration effective; and how to react to attacks after they have been detected. The book is mainly intended for an audience of specialists/implementers who are responsible for the security of their organizations. This means, first of all, security administrators, as well as system and network administrators.
About the Author
Alex Lukatsky is a security administrator for Check Point Software Technologies and a certified instructor in security issues for the Internet Security Systems.