Описание: Kevin Mitnick, the world`s most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In The Art of Intrusion, Mitnick offers hair-raising stories of real-life computer break-ins, and shows how the victims could have prevented them.
Описание: Explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network.
Автор: ?lvaro Herrero; Emilio Corchado Название: Mobile Hybrid Intrusion Detection ISBN: 3642423418 ISBN-13(EAN): 9783642423413 Издательство: Springer Рейтинг: Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: It has led to the design of MOVICAB-IDS (MObile VIsualisation Connectionist Agent-Based IDS), a novel Intrusion Detection System (IDS), which is comprehensively described in this book.This novel IDS combines different AI paradigms to visualise network traffic for ID at packet level.
Автор: Christopher Kruegel; Richard Lippmann; Andrew Clar Название: Recent Advances in Intrusion Detection ISBN: 3540743197 ISBN-13(EAN): 9783540743194 Издательство: Springer Рейтинг: Цена: 10480.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection, RAID 2007, held in Gold Coast, Australia in September 2007. This work contains 17 papers that are organized in topical sections on anomaly detection, attacks, system evaluation and threat assessment and malware collection and analysis.
Автор: Rory Bray Название: OSSEC Host-Based Intrusion Detection Guide, ISBN: 159749240X ISBN-13(EAN): 9781597492409 Издательство: Elsevier Science Рейтинг: Цена: 7656.00 р. Наличие на складе: Поставка под заказ.
Описание: This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented.until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.-- Stephen Northcutt. OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This "picture" captures the most relevant information about that machine's configuration. OSSEC saves this "picture" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. . Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are
Описание: Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru