Practical Intrusion Analysis
Prevention and Detection for the Twenty-First Century
(Sprache: Englisch)
"Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis." --Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention...
Leider schon ausverkauft
versandkostenfrei
Buch
45.65 €
Produktdetails
Produktinformationen zu „Practical Intrusion Analysis “
"Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis." --Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field's leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today's new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more.
Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes * Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies* Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions* Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks* Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls* Implementing IDS/IPS systems that protect wireless data traffic* Enhancing your intrusion detection efforts by converging with physical security defenses* Identifying attackers' "geographical fingerprints" and using that information to respond more effectively* Visualizing data traffic to identify suspicious patterns more quickly* Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a.
Rain Forest Puppy, senior security professional and creator of libwhisker Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University Alex Kirk, Member, Sourcefire Vulnerability Research Team
Klappentext zu „Practical Intrusion Analysis “
"Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis." -Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field's leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today's new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more. Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologiesUsing Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusionsAnalyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacksUnderstanding the theory, advantages, and disadvantages of the latest Web Application FirewallsImplementing IDS/IPS systems that protect wireless data trafficEnhancing your intrusion detection efforts by converging with physical security defensesIdentifying attackers' "geographical fingerprints" and using that information to respond more effectivelyVisualizing data traffic to identify suspicious patterns more quicklyRevisiting intrusion detection
... mehr
ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker
Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University Alex Kirk, Member, Sourcefire Vulnerability Research Team
Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University Alex Kirk, Member, Sourcefire Vulnerability Research Team
... weniger
Inhaltsverzeichnis zu „Practical Intrusion Analysis “
Preface xv Chapter 1: Network Overview 1 Chapter 2: Infrastructure Monitoring 31 Chapter 3: Intrusion Detection Systems 53 Chapter 4: Lifecycle of a Vulnerability 87 Chapter 5: Proactive Intrusion Prevention and Response via Attack Graphs 119 Chapter 6: Network Flows and Anomaly Detection 151 Chapter 7: Web Application Firewalls 185 Chapter 8: Wireless IDS/IPS 209 Chapter 9: Physical Intrusion Detection for IT 235 Chapter 10: Geospatial Intrusion Detection 275 Chapter 11: Visual Data Communications 347 Chapter 12: Return on Investment: Business Justification 391 Appendix: Bro Installation Guide 435 Index 441
Autoren-Porträt von Ryan Trost
Ryan Trost is the Director of Security and Data Privacy Officer at Comprehensive Health Services where he oversees all the organization's security and privacy decisions. He teaches several Information Technology courses, including Ethical Hacking, Intrusion Detection, and Data Visualization at Northern Virginia Community College. This enables him to continue exploring his technical interests among the endless managerial meetings. In his spare time, Ryan works to cross-pollinate network security, GIS, and data visualization. He is considered a leading expert in geospatial intrusion detection techniques and has spoken at several conferences on the topic, most notably DEFCON 16. Ryan participated as a RedTeamer in the first annual Collegiate Cyber Defense Competition (CCDC) and now fields a team of students in the annual event. Ryan has been a senior security consultant for several government agencies before transitioning over to the private sector. In 2005, Ryan received his masters of science degree in computer science from George Washington University where he developed his first geospatial intrusion detection tool.
Bibliographische Angaben
- Autor: Ryan Trost
- 2009, 480 Seiten, Maße: 17,7 x 23,4 cm, Kartoniert (TB), Englisch
- Verlag: Addison-Wesley Longman, Amsterdam
- ISBN-10: 0321591801
- ISBN-13: 9780321591807
Sprache:
Englisch
Kommentar zu "Practical Intrusion Analysis"
0 Gebrauchte Artikel zu „Practical Intrusion Analysis“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Practical Intrusion Analysis".
Kommentar verfassen