Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама




Название: Practical Intrusion Analysis: prevention and detection for the twenty-first century
Автор: Ryan Trost
Издательство: Pearson Education, Inc.
Год: 2010
Формат: PDF
Страниц: 480
Размер: 13,93 МБ
Язык: English

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field’s leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers.

Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today’s new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more.

Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes

Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies
Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions
Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks
Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls
Implementing IDS/IPS systems that protect wireless data traffic
Enhancing your intrusion detection efforts by converging with physical security defenses
Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively
Visualizing data traffic to identify suspicious patterns more quickly
Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives








ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!







Автор: ak5812 18-07-2018, 07:15 | Напечатать |
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.





С этой публикацией часто скачивают:

Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.


 MirKnig.Su  ©2024     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности