Intrusion Signatures & Analysis

Intrusion Signatures & Analysis

Autor:
Intrusion Detection is a red-hot topic in today's technology and security field. You hear daily stories of networks compromised or rendered unusable by attack. The cyber-criminals behind this must be stopped. The majority of the security analysts working today are not properly trained to do their important work, and often have to learn on the job or on their own. This book empowers the security specialist to analyze and interpret the traces that they are seeing, find their source, and stop the intrusion. This book also contains must-have information for the experienced intrusion analyst.
154,00 zł
Data wydania:
Czas dostawy:
Wydawnictwo:
Liczba stron:
448
Forma publikacji:
Język:
Wydanie:
ISBN:
9780735710634
Kategorie:

Intrusion Detection is a red-hot topic in today's technology and security field. You hear daily stories of networks compromised or rendered unusable by attack. The cyber-criminals behind this must be stopped. The majority of the security analysts working today are not properly trained to do their important work, and often have to learn on the job or on their own. This book empowers the security specialist to analyze and interpret the traces that they are seeing, find their source, and stop the intrusion. This book also contains must-have information for the experienced intrusion analyst.



 1. Reading Log Formats.


 2. Introduction to the Practicals.


 3. The Ten Most Critical Internet Security Threats, Part 1.


 4. The Ten Most Critical Internet Security Threats, Part 2.


 5. Reactions and Responses.


 6. Perimeter Logs.


 7. Non-Malicious Traffic.


 8. Network Mapping.


 9. Scans that Probe Systems for Information.


10. Denial Of Service (DoS)—Resource Starvation.


11. Denial Of Service (DoS)—Bandwidth Consumption.


12. Trojans.


13. Exploits.


14. Buffer Overflows with Content.


15. Fragmentation.


16. False Positives.


17. Out of Spec Packets.