eBooks-it.org Logo
eBooks-IT.org Inner Image

Practical Intrusion Analysis

Prevention and Detection for the Twenty-First Century

Practical Intrusion Analysis Image

Book Details:

Publisher:Addison-Wesley Professional
Series: Addison Wesley , Practical
Author:Ryan Trost
Edition:1
ISBN-10:0321591801
ISBN-13:9780321591807
Pages:480
Published:Jul 04 2009
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:11.7 MB

Book Description:

'Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.' Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field's leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today's new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more. Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers' 'geographical fingerprints' and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University Alex Kirk, Member, Sourcefire Vulnerability Research Team

Download Link:

Related Books:

Network Intrusion Analysis

Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis Image
Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on t...

Practical Data Analysis and Reporting with BIRT

Practical Data Analysis and Reporting with BIRT Image
This book is a concise and practical guide aimed at getting the results you want as quickly as possible. It steers the reader through each point of reporting from setup, to scripting, designing, formatting, and deploying BIRT reports using a common example that runs through the book. This book is for Java developers who want to create rich reports and get started with BIRT to do this. Readers will need a basic understanding of SQL to follow along....

Practical Packet Analysis

Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis Image
2nd Edition
It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis will teach you how to make sense of your PCAP data. You'll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP netw...



2007 - 2021 © eBooks-IT.org