Practical Intrusion Analysis

Practical Intrusion Analysis
Author :
Publisher : Pearson Education
Total Pages : 794
Release :
ISBN-10 : 9780321591883
ISBN-13 : 0321591887
Rating : 4/5 (83 Downloads)

Book Synopsis Practical Intrusion Analysis by : Ryan Trost

Download or read book Practical Intrusion Analysis written by Ryan Trost and published by Pearson Education. This book was released on 2009-06-24 with total page 794 pages. Available in PDF, EPUB and Kindle. Book excerpt: “Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.” –Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field’s leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today’s new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more. Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University Alex Kirk, Member, Sourcefire Vulnerability Research Team


Practical Intrusion Analysis Related Books

Practical Intrusion Analysis
Language: en
Pages: 794
Authors: Ryan Trost
Categories: Computers
Type: BOOK - Published: 2009-06-24 - Publisher: Pearson Education

DOWNLOAD EBOOK

“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.” –Nate Miller, Cofounder, Stratum Securi
Practical Intrusion Detection Handbook
Language: en
Pages: 392
Authors: Paul E. Proctor
Categories: Computers
Type: BOOK - Published: 2001 - Publisher: Prentice Hall

DOWNLOAD EBOOK

The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise! Product selection, planning, and operations Filled with r
Network Intrusion Analysis
Language: en
Pages: 253
Authors: Joe Fichera
Categories: Computers
Type: BOOK - Published: 2013 - Publisher: Newnes

DOWNLOAD EBOOK

Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: Providing a step-by-step guide to the tools and techniques used
The Practice of Network Security Monitoring
Language: en
Pages: 376
Authors: Richard Bejtlich
Categories: Computers
Type: BOOK - Published: 2013-07-15 - Publisher: No Starch Press

DOWNLOAD EBOOK

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective comput
Applied Network Security Monitoring
Language: en
Pages: 497
Authors: Chris Sanders
Categories: Computers
Type: BOOK - Published: 2013-11-26 - Publisher: Elsevier

DOWNLOAD EBOOK

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complet