Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

Buy

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field’s leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers.

 

Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today’s new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more.

 

Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes

  • Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies
  • Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions
  • Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks
  • Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls
  • Implementing IDS/IPS systems that protect wireless data traffic
  • Enhancing your intrusion detection efforts by converging with physical security defenses
  • Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively
  • Visualizing data traffic to identify suspicious patterns more quickly
  • Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives

Includes contributions from these leading network security experts:

 

Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker

Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior

 

Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security

 

Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University

 

Alex Kirk, Member, Sourcefire Vulnerability Research Team

(HTML tags aren't allowed.)

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

Thinking in LINQ: Harnessing the Power of Functional Programming in .NET Applications
Thinking in LINQ: Harnessing the Power of Functional Programming in .NET Applications

LINQ represents a paradigm shift for developers used to an imperative/object oriented programming style, because LINQ draws on functional programming principles. Thinking in LINQ addresses the differences between these two by providing a set of succinct recipes arranged in several groups, including:

Newnes Guide to Television and Video Technology, Third Edition
Newnes Guide to Television and Video Technology, Third Edition
A truly accessible guide to TV technology and the Digital revolution.

The third edition of the Newnes Guide to Television & Video Technology is the definitive guide to analogue and digital TV technology. Eugene Trundle explores the fundamentals of Digital TV (satellite, cable and terrestrial) and Digital Video, as well as providing a
...

Creating a Brand Identity: A Guide for Designers
Creating a Brand Identity: A Guide for Designers

Creating A Brand Identity is a complex challenge for the graphic designer. It requires practical design skills and creative drive as well as an understanding of marketing and consumer behaviour. This practical handbook is a comprehensive introduction to this creative process.

Exercises and examples highlight the key
...

Apache Geronimo: Enterprise Java Development and Deployment
Apache Geronimo: Enterprise Java Development and Deployment

Geronimo is a free, open source J2EE™ application server. It comes with everything you need to run standard J2EE applications developed against the J2EE 1.4 specifications, and it is also backward-compatible to J2EE 1.3 and J2EE 1.2. Furthermore, its modular design makes it easy to customize, extend, or replace core server...

The Ask: How to Ask for Support for Your Nonprofit Cause, Creative Project, or Business Venture
The Ask: How to Ask for Support for Your Nonprofit Cause, Creative Project, or Business Venture

A completely revised edition of the must-have resource for increasing your nonprofit's bottom line This thoroughly revised and updated edition of the best-selling book The Ask is filled with suggestions, guidelines, and down-to-earth advice that will give you the confidence to ask anyone for any size gift, for any purpose. Written in...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy