Protect Your Information with Intrusion Detection (Power)


Protect Your Information with Intrusion Detection
by Alex Lukatsky ISBN:1931769117
A-LIST Publishing 2003 (536 pages)

Answers on What, Where, and How to detect intrusion and what is necessary to build a system and make a network’s configuration effective, as well as how to react to attacks after they have been detected.

Table of Contents
Protect Your Information with Intrusion Detection
Introduction
Chapter 1 - Introduction to Intrusion Detection
Chapter 2 - Anatomy of an Attack
Chapter 3 - Introduction to Intrusion Detection
Chapter 4 - The Three Basic Principles of Intrusion Detection
Chapter 5 - Detecting Attack Traces
Chapter 6 - Classification of Intrusion Detection Systems
Chapter 7 - Anticipating Attacks, or Creating an Intrusion Detection Infrastructure
Chapter 8 - The Life Cycle, Deployment, and Implementation of an IDS
Chapter 9 - Selecting an Intrusion Detection System
Chapter 10 - Placement of the Intrusion Detection System
Chapter 11 - Using Intrusion Detection Systems
Chapter 12 - Common IDS Problems
Chapter 13 - Standardization in the Field of Intrusion Detection
Chapter 14 - Incident Response
Appendix A - List of Ports Frequently Used by Trojans
Appendix B - List of Most Frequently Scanned Ports
Appendix C - List of Internet Address Ranges
Appendix D - List of First-Level Domains
Appendix E - List of Protocol Identifiers for IPv4
Bibliography
Index
List of Figures
List of Tables
List of Code Examples
List of Sidebars

Категории