- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
Intrusion Detection: Network Security Beyond the Firewallby Terry Escamilla
Synopses & Reviews
A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products
Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever on the alert, to sniff out suspicious behavior on your network. This book gives you the additional ammo you need. Terry Escamilla shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense. He provides:
* Assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security
* Recommendations for dramatically improving network security using the right combination of intrusion detection products
* The lowdown on identification and authentication, firewalls, and access control
* Detailed comparisons between today's leading intrusion detection product categories
* A practical perspective on how different security products fit together to provide protection for your network
The companion Web site at www.wiley.com/compbooks/escamilla features: White papers
* Industry news
* Product information
Book News Annotation:
Explains how intrusion detection systems (IDS) fit in with other computer security systems such as encryption and firewalls. Software examples and product descriptions are provided. Chapters cover topics such as traditional security systems, vulnerability scanners, and UNIX system-level IDS. Annotation c. by Book News, Inc., Portland, OR (firstname.lastname@example.org)
Includes bibliographical references (p. 329-332) and index.
About the Author
TERRY ESCAMILLA, PhD, is a Senior Software Architect for IBM Corporation in Boulder, Colorado. He previously worked for Haystack Labs, now part of Network Associates, a leading vendor of intrusion detection products including the Stalker family of products. A well-respected specialist in computer security and software engineering, Dr. Escamilla spent six years with IBM before joining Haystack in 1996. After Haystack was acquired by Trusted Information Systems and then by Network Associates, Dr. Escamilla rejoined IBM to work on e-business solutions.
Table of Contents
BEFORE INTRUSION DETECTION: TRADITIONAL COMPUTER SECURITY.
Intrusion Detection and the Classic Security Model.
The Role of Identification and Authentication in Your Environment.
The Role of Access Control in Your Environment.
Traditional Network Security Approaches.
INTRUSION DETECTION: BEYOND TRADITIONAL SECURITY.
Intrusion Detection and Why You Need It.
Detecting Intruders on Your System Is Fun and Easy.
UNIX System-Level IDSs.
Sniffing for Intruders.
Intrusion Detection for NT.
ROUNDING OUT YOUR ENVIRONMENT.
You've Been Hit!
Intrusion Detection: Not the Last Chapter When It Comes To Security.
What Our Readers Are Saying
Other books you might like