_ Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective _ Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS _ Features coverage of the recently revised IETF IDS specification _ Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling _ Provides step-by-step instructions for configuration procedures
_ Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective _ Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS _ Features coverage of the recently revised IETF IDS specification _ Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling _ Provides step-by-step instructions for configuration proceduresHinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.