“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.”
–Nate Miller, Cofounder, Stratum Security
The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field’s leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers.
Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today’s new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more.
Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes
- Assessing the strengths and limitations of mainstream monitoring tools and IDS technologiesUsing Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusionsAnalyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacksUnderstanding the theory, advantages, and disadvantages of the latest Web Application FirewallsImplementing IDS/IPS systems that protect wireless data trafficEnhancing your intrusion detection efforts by converging with physical security defensesIdentifying attackers’ “geographical fingerprints” and using that information to respond more effectivelyVisualizing data traffic to identify suspicious patterns more quicklyRevisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives
Includes contributions from these leading network security experts:
Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker
Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security WarriorDr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security
Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University
Alex Kirk, Member, Sourcefire Vulnerability Research Team
Sienna has a bit of a problem. She’s a vampire by day and human by night. And it’s just as confusing as it sounds. Does the Daywalker have what it takes to take down some of the world’s most feared and powerful vampires? Get this complete series boxed set to find out! --- What do you call a vampire by day, a human by night? Confused? That makes two of us! Sunlight is a little p...Supports Lendle with Commissions EarnedGenres for this book
You seem to be using an adblocker so we are unable to offer you a choice of how to handle cookies that we use on this site. Please disable the adblocker or add an exclusion for this site if you wish to customise cookies.