Nicht lieferbar

Implementing Intrusion Detection Systems
Versandkostenfrei!
Nicht lieferbar
_ Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
_ Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
_ Features coverage of the recently revised IETF IDS specification
_ Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
_ Provides step-by-step instructions for configuration procedures
_ Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
_ Features coverage of the recently revised IETF IDS specification
_ Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
_ Provides step-by-step instructions for configuration procedures