| Table of Contents |
| Protect Your Information with Intrusion Detection |
| Introduction |
| Chapter 1 | - | Introduction to Intrusion Detection |
| Chapter 2 | - | Anatomy of an Attack |
| Chapter 3 | - | Introduction to Intrusion Detection |
| Chapter 4 | - | The Three Basic Principles of Intrusion Detection |
| Chapter 5 | - | Detecting Attack Traces |
| Chapter 6 | - | Classification of Intrusion Detection Systems |
| Chapter 7 | - | Anticipating Attacks, or Creating an Intrusion Detection Infrastructure |
| Chapter 8 | - | The Life Cycle, Deployment, and Implementation of an IDS |
| Chapter 9 | - | Selecting an Intrusion Detection System |
| Chapter 10 | - | Placement of the Intrusion Detection System |
| Chapter 11 | - | Using Intrusion Detection Systems |
| Chapter 12 | - | Common IDS Problems |
| Chapter 13 | - | Standardization in the Field of Intrusion Detection |
| Chapter 14 | - | Incident Response |
| Appendix A | - | List of Ports Frequently Used by Trojans |
| Appendix B | - | List of Most Frequently Scanned Ports |
| Appendix C | - | List of Internet Address Ranges |
| Appendix D | - | List of First-Level Domains |
| Appendix E | - | List of Protocol Identifiers for IPv4 |
| Bibliography |
| Index |
| List of Figures |
| List of Tables |
| List of Code Examples |
| List of Sidebars |