The Fictioning Horror Sale
 
 

Recently Viewed clear list


Original Essays | September 4, 2014

Edward E. Baptist: IMG The Two Bodies of The Half Has Never Been Told: Slavery and the Making of American Capitalism



My new book, The Half Has Never Been Told: Slavery and the Making of American Capitalism, is the story of two bodies. The first body was the new... Continue »
  1. $24.50 Sale Hardcover add to wish list

spacer
Qualifying orders ship free.
$55.20
List price: $67.25
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
1 Partner Warehouse General- General

Practical Intrusion Analysis: Prevention and Detection for the Twenty-first Century (10 Edition)

by

Practical Intrusion Analysis: Prevention and Detection for the Twenty-first Century (10 Edition) Cover

 

Synopses & Reviews

Publisher Comments:

Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.”

   –Nate Miller, Cofounder, Stratum Security

 

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field’s leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers.

 

Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today’s new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more.

 

Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes

 

  • Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies
  • Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions
  • Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks
  • Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls
  • Implementing IDS/IPS systems that protect wireless data traffic
  • Enhancing your intrusion detection efforts by converging with physical security defenses
  • Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively
  • Visualizing data traffic to identify suspicious patterns more quickly
  • Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives

 

Includes contributions from these leading network security experts:

 

Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker

Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior

 

Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security

 

Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University

 

Alex Kirk, Member, Sourcefire Vulnerability Research Team

 

About the Author

Ryan Trost is the Director of Security and Data Privacy Officer at Comprehensive Health Services where he oversees all the organization’s security and privacy decisions. He teaches several Information Technology courses, including Ethical Hacking, Intrusion Detection, and Data Visualization at Northern Virginia Community College. This enables him to continue exploring his technical interests among the endless managerial meetings. In his spare time, Ryan works to cross-pollinate network security, GIS, and data visualization. He is considered a leading expert in geospatial intrusion detection techniques and has spoken at several conferences on the topic, most notably DEFCON 16. Ryan participated as a RedTeamer in the first annual Collegiate Cyber Defense Competition (CCDC) and now fields a team of students in the annual event. Ryan has been a senior security consultant for several government agencies before transitioning over to the private sector. In 2005, Ryan received his masters of science degree in computer science from George Washington University where he developed his first geospatial intrusion detection tool.

Table of Contents

Preface     xv

Chapter 1: Network Overview     1

Chapter 2: Infrastructure Monitoring     31

Chapter 3: Intrusion Detection Systems     53

Chapter 4: Lifecycle of a Vulnerability     87

Chapter 5: Proactive Intrusion Prevention and Response via Attack Graphs     119

Chapter 6: Network Flows and Anomaly Detection     151

Chapter 7: Web Application Firewalls     185

Chapter 8: Wireless IDS/IPS     209

Chapter 9: Physical Intrusion Detection for IT     235

Chapter 10: Geospatial Intrusion Detection     275

Chapter 11: Visual Data Communications     347

Chapter 12: Return on Investment: Business Justification     391

Appendix: Bro Installation Guide     435

Index     441

 

Product Details

ISBN:
9780321591807
Author:
Trost, Ryan
Publisher:
Addison-Wesley Professional
Subject:
Internet - Security
Subject:
Computer security
Subject:
Computer networks -- Security measures.
Subject:
Security - General
Subject:
Internet - General
Copyright:
Edition Description:
Trade paper
Publication Date:
June 2009
Binding:
TRADE PAPER
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Y
Pages:
480
Dimensions:
9.2 x 7 x 0.965 in 771 gr

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » Security » General
History and Social Science » Crime » General

Practical Intrusion Analysis: Prevention and Detection for the Twenty-first Century (10 Edition) New Trade Paper
0 stars - 0 reviews
$55.20 In Stock
Product details 480 pages Addison-Wesley Professional - English 9780321591807 Reviews:
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.