Network Intrusion Detection An Analyst's Handbook

ISBN-10: 0735710082
ISBN-13: 9780735710085
Edition: 2nd 2000
List price: $45.00
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: For courses in Network Security. Intrusion detection is one of the hottest growing areas of network security. As the number of corporate, government, and educational networks grow and as they become more and more interconnected through the  More...

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Writing a Scientific Report Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $45.00
Edition: 2nd
Copyright year: 2000
Publisher: New Riders Publishing
Publication date: 9/19/2000
Binding: Paperback
Pages: 480
Size: 7.01" wide x 8.98" long x 0.98" tall
Weight: 1.650
Language: English

For courses in Network Security. Intrusion detection is one of the hottest growing areas of network security. As the number of corporate, government, and educational networks grow and as they become more and more interconnected through the Internet, there is a correlating increase in the types and numbers of attacks to penetrate those networks. Network Intrusion Detection: An Analyst's Handbook, Second Edition is a training aid and reference for intrusion detection analysts and networking students. This book is meant to be practical. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. The book's approach is to introduce and ground topics through actual traffic patterns. The authors have been through the trenches and give you access to unusual and unique data.

Introduction
IP Concepts
The TCP/IP Internet Model
Packaging (Beyond Paper or Plastic)
Addresses
Service Ports
IP Protocols
Domain Name System
Routing: How You Get There From Here
Summary
Introduction to TCP dump and Transmission Control Protocol (TCP)
TCP dump
Introduction to TCP
TCP Gone Awry
Summary
Fragmentation
Theory of Fragmentation
Malicious Fragmentation
Summary
ICMP
ICMP Theory
Mapping Techniques
Normal ICMP Activity
Malicious ICMP Activity
To Block or Not To Block
Summary
Hardware-Based ID
Defense in Depth
Program-Based ID
Smart Auditors
Summary
Exploits and Scans to Apply Exploits
False Positives
IMAP Exploits
Scans to Apply Exploits
Single Exploit, Portmap
Summary
Denial of Service
Brute-Force Denial-of-Service Traces
Elegant Kills
nmap 2.53
Distributed Denial-of-Service Attacks
Summary
Detection of Intelligence Gathering
Network and Host Mapping
NetBIOS-Specific Traces
Stealth Attacks
Measuring Response Time
Viruses as Information Gatherers
Summary
The Trouble with RPCs
portmapper
dump Is a Core Component of rpcinfo
Attacks That Directly Access an RPC Service
The Big Three
Analysis Under Fire
Oh nmap!
Summary
Filters to Detect, Filters to Protect
The Mechanics of Writing TCPdump Filters
Bit Masking
TCPdump IP Filters
TCPdump UDP Filters
TCPdump TCP Filters
Summary
System Compromise
Christmas Eve 1998
Where Attackers Shop
Communications Network
Anonymity
Summary
The Hunt for Timex
The Traces
The Hunt Begins
Y2K
Sources Found
Miscellaneous Findings
Summary Checklist
Epilogue and Purpose
Summary
Organizational Issues
Organizational Security Model
Defining Risk
Risk
Defining the Threat
Risk Management Is Dollar Driven
How Risky Is a Risk?
Summary
Automated and Manual Response
Automated Response
Honeypot
Manual Response
Summary
Business Case for Intrusion Detection
Management Issues
Threats and Vulnerabilities
Tradeoffs and Recommended Solution
Repeat the Executive Summary
Summary
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×