English
United States
Sign in
Tip from find-more-books.com
Similar books
More/other books that might be very similar to this book
Search tools
Book recommendations
Latest news
Advertising
FILTER
- 0 Results
Lowest price: 0.80 €, highest price: 21.81 €, average price: 5.87 €
Network Intrusion Detection: An Analyst's Handbook (2nd Edition) - Judy Novak, Stephen Northcutt
book is out-of-stock
(*)
Judy Novak, Stephen Northcutt:
Network Intrusion Detection: An Analyst's Handbook (2nd Edition) - Paperback

2007, ISBN: 0735710082

[SR: 442122], Paperback, [EAN: 9780735710085], Que Publishing, Que Publishing, Book, [PU: Que Publishing], Que Publishing, A collection of after-action reports on a variety of network attacks, Network Intrusion Detection enables you to learn from others' mistakes as you endeavor to protect your networks from intrusion. Authors Stephen Northcutt and Judy Novak document real attacks on systems, and highlight characteristics that you--you being a network communications analyst or security specialist--can look for on your own machines. The authors mince no words, and advise you on the detection tools to use (they like and use Snort, as well as Shadow, Tripwire, TCP Wrappers, and others) and how to use them. This second edition of the book includes less about year-2000 preparation and more about the latest in attacks, countermeasures, and the growing community of white-hat hackers who share information to keep systems safe. In teaching their readers about the attacks that exploit a particular protocol or service, the authors typically present a TCPdump listing that shows an attack, and then comment upon it. They tell you what the attackers did, how successful they were, and how the attack might have been detected and shut down. To cite one example, there's a very detailed analysis of Kevin Mitnick's famous attack (a SYN flood, combined with TCP hijacking) on one of Tsutomu Shimomura's machines. By following the advice in this book, you'll likely do well in protecting your machines against people whom the authors call "script kiddies" --small-time hackers who follow published recipes (or run prewritten routines). Also, you'll be about as prepared as you can be against more skilled attackers who make up their attacks on their own. This is great reading for anyone who's involved in developing filters to ward off attacks or monitoring network communications for suspicious activity. It's also a valuable resource for someone who's evaluating network countermeasures in preparation for deployment. --David Wall Topics covered: Analysis of TCP/IP traffic, with an eye toward detecting and halting malicious activity, both manually and automatically. Subjects include tools for finding weaknesses and initiating attacks, and the signatures that identify these tools. There's discussion of the vulnerabilities that exist in services, such as IMAP and Domain Name System (DNS)., 2205888011, Custom Stores, 7187330011, Amazon Publishing, 13901671, Audiobooks, 14244971, Bargain Books, 13621591, Boxed Sets, 194725011, Canada Day Deals, 377366011, Christian Living Store, 263003011, For Dummies Store, 2354164011, Formats, 714830011, Kids & Family Store, 370821011, Qualifying Textbooks - Fall 2007, 1040638, Specialty Stores, 916520, Books, 935742, E-commerce, 935750, Internet Marketing, 935746, Online Banking, 935748, Online Trading, 935664, Industries & Professions, 935522, Business & Investing, 927726, Subjects, 916520, Books, 939686, New Riders, 939670, Publisher, 939614, Certification Central, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939698, Que, 939670, Publisher, 939614, Certification Central, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939342, Networks, 939332, Networks, Protocols & APIs, 939330, Networking & Cloud Computing, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939288, Network Security, 939330, Networking & Cloud Computing, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939856, Programming, 939860, APIs & Operating Environments, 939840, Algorithms, 11614256011, Apple Programming, 939940, C, 939374, Cross-platform Development, 146406011, Functional, 15677611, Game Programming, 939902, Graphics & Multimedia, 939918, Introductory & Beginning, 939240, Java, 939934, Languages & Tools, 377604011, Mobile Phone Programming, 939354, Network Programming, 11614259011, Parallel Programming, 939590, Software Design, Testing & Engineering, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939418, Software, 939420, Business, 939498, Databases, 146395011, Directories, 939386, E-mail, 939580, Introductory Guides, 274679011, Mathematical & Statistical, 274678011, Natural Language Processing, 146394011, Optical Character Recognition, 939514, Personal Finance, 939530, Spreadsheets, 939578, Voice Recognition, 939562, Word Processors & Editors, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939280, Encryption, 939278, Security & Encryption, 939084, Web Development, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 387057011, Engineering, 387202011, Aerospace, 387213011, Automotive, 387217011, Bioengineering, 387058011, Chemical, 387071011, Civil, 387123011, Computer Technology, 387276011, Design, 387277011, Economics, 387278011, Education, 387132011, Electrical & Electronics, 387279011, Energy, 387177011, Industrial, Manufacturing & Operational Systems, 387296011, Management, 387313011, Marine, 387297011, Materials, 387191011, Materials Science, 387223011, Mechanical, 387247011, Nuclear, 387310011, Patents & Inventions, 387248011, Petroleum, Mining & Geological, 387311011, Power Systems, 387256011, Reference, 387312011, Research, 387257011, Special Topics, 387264011, Telecommunications, 387275011, Welding, 950756, Professional & Technical, 927726, Subjects, 916520, Books, 15305731, Networking, 15305691, Computer Science & Information Systems, 15115321, Textbooks, 927726, Subjects, 916520, Books

New book Amazon.ca
USA_Seller_4_Canada
, Neuware Shipping costs:Usually ships within 1 - 2 business days, plus shipping costs
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.
Network Intrusion Detection: An Analyst's Handbook (2nd Edition) - Judy Novak, Stephen Northcutt
book is out-of-stock
(*)
Judy Novak, Stephen Northcutt:
Network Intrusion Detection: An Analyst's Handbook (2nd Edition) - Paperback

2007, ISBN: 0735710082

[SR: 442122], Paperback, [EAN: 9780735710085], Que Publishing, Que Publishing, Book, [PU: Que Publishing], Que Publishing, A collection of after-action reports on a variety of network attacks, Network Intrusion Detection enables you to learn from others' mistakes as you endeavor to protect your networks from intrusion. Authors Stephen Northcutt and Judy Novak document real attacks on systems, and highlight characteristics that you--you being a network communications analyst or security specialist--can look for on your own machines. The authors mince no words, and advise you on the detection tools to use (they like and use Snort, as well as Shadow, Tripwire, TCP Wrappers, and others) and how to use them. This second edition of the book includes less about year-2000 preparation and more about the latest in attacks, countermeasures, and the growing community of white-hat hackers who share information to keep systems safe. In teaching their readers about the attacks that exploit a particular protocol or service, the authors typically present a TCPdump listing that shows an attack, and then comment upon it. They tell you what the attackers did, how successful they were, and how the attack might have been detected and shut down. To cite one example, there's a very detailed analysis of Kevin Mitnick's famous attack (a SYN flood, combined with TCP hijacking) on one of Tsutomu Shimomura's machines. By following the advice in this book, you'll likely do well in protecting your machines against people whom the authors call "script kiddies" --small-time hackers who follow published recipes (or run prewritten routines). Also, you'll be about as prepared as you can be against more skilled attackers who make up their attacks on their own. This is great reading for anyone who's involved in developing filters to ward off attacks or monitoring network communications for suspicious activity. It's also a valuable resource for someone who's evaluating network countermeasures in preparation for deployment. --David Wall Topics covered: Analysis of TCP/IP traffic, with an eye toward detecting and halting malicious activity, both manually and automatically. Subjects include tools for finding weaknesses and initiating attacks, and the signatures that identify these tools. There's discussion of the vulnerabilities that exist in services, such as IMAP and Domain Name System (DNS)., 2205888011, Custom Stores, 7187330011, Amazon Publishing, 13901671, Audiobooks, 14244971, Bargain Books, 13621591, Boxed Sets, 194725011, Canada Day Deals, 377366011, Christian Living Store, 263003011, For Dummies Store, 2354164011, Formats, 714830011, Kids & Family Store, 370821011, Qualifying Textbooks - Fall 2007, 1040638, Specialty Stores, 916520, Books, 935742, E-commerce, 935750, Internet Marketing, 935746, Online Banking, 935748, Online Trading, 935664, Industries & Professions, 935522, Business & Investing, 927726, Subjects, 916520, Books, 939686, New Riders, 939670, Publisher, 939614, Certification Central, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939698, Que, 939670, Publisher, 939614, Certification Central, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939342, Networks, 939332, Networks, Protocols & APIs, 939330, Networking & Cloud Computing, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939288, Network Security, 939330, Networking & Cloud Computing, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939856, Programming, 939860, APIs & Operating Environments, 939840, Algorithms, 11614256011, Apple Programming, 939940, C, 939374, Cross-platform Development, 146406011, Functional, 15677611, Game Programming, 939902, Graphics & Multimedia, 939918, Introductory & Beginning, 939240, Java, 939934, Languages & Tools, 377604011, Mobile Phone Programming, 939354, Network Programming, 11614259011, Parallel Programming, 939590, Software Design, Testing & Engineering, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939418, Software, 939420, Business, 939498, Databases, 146395011, Directories, 939386, E-mail, 939580, Introductory Guides, 274679011, Mathematical & Statistical, 274678011, Natural Language Processing, 146394011, Optical Character Recognition, 939514, Personal Finance, 939530, Spreadsheets, 939578, Voice Recognition, 939562, Word Processors & Editors, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 939280, Encryption, 939278, Security & Encryption, 939084, Web Development, 939082, Computers & Technology, 927726, Subjects, 916520, Books, 387057011, Engineering, 387202011, Aerospace, 387213011, Automotive, 387217011, Bioengineering, 387058011, Chemical, 387071011, Civil, 387123011, Computer Technology, 387276011, Design, 387277011, Economics, 387278011, Education, 387132011, Electrical & Electronics, 387279011, Energy, 387177011, Industrial, Manufacturing & Operational Systems, 387296011, Management, 387313011, Marine, 387297011, Materials, 387191011, Materials Science, 387223011, Mechanical, 387247011, Nuclear, 387310011, Patents & Inventions, 387248011, Petroleum, Mining & Geological, 387311011, Power Systems, 387256011, Reference, 387312011, Research, 387257011, Special Topics, 387264011, Telecommunications, 387275011, Welding, 950756, Professional & Technical, 927726, Subjects, 916520, Books, 15305731, Networking, 15305691, Computer Science & Information Systems, 15115321, Textbooks, 927726, Subjects, 916520, Books

Used or antiquarian book Amazon.ca
_betterworldbooks_
Gebraucht Shipping costs:Usually ships within 1 - 2 business days, plus shipping costs
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.
Network Intrusion Detection: An Analyst's Handbook - Northcutt, Stephen / Novak, Judy / McLachlan, Donald
book is out-of-stock
(*)
Northcutt, Stephen / Novak, Judy / McLachlan, Donald:
Network Intrusion Detection: An Analyst's Handbook - used book

ISBN: 9780735710085

ID: 2668906

This book is a training aid and reference for intrusion detection analysts. There will be some theory and reference to many outside papers and research work, but mostly this book is meant to be practical. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. People travel from all over the world to hear them speak, and this book will be a distillation of that experience. The approach differs from pure theoretical books by introducing and grounding topics through actual traffic patterns. Unlike other books, the authors have been through the trenches and give the readers access to unusual and unique data. By juxtaposing the unusual data with the normal, the reader gains a better understanding of what is occurring. Network Intrusion Detection: An Analyst's Handbook Northcutt, Stephen / Novak, Judy / McLachlan, Donald, New Riders Publishing

Used or antiquarian book Betterworldbooks.com
Shipping costs:zzgl. Versandkosten, plus shipping costs
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.
Network Intrusion Detection: An Analyst`s Handbook (Landmark (New Riders)) - Stephen Novak Northcutt
book is out-of-stock
(*)
Stephen Novak Northcutt:
Network Intrusion Detection: An Analyst`s Handbook (Landmark (New Riders)) - Paperback

ISBN: 9780735710085

ID: INF3003129731

Network Intrusion Detection: An Analyst`s Handbook (Landmark (New Riders)):, New Riders

Used or antiquarian book Regalfrei-shop.de
Taschenbuch, Deutsch, Gebraucht Shipping costs:2,50 EUR DHL-Versand, ab 20 EUR Versandkostenfrei in Deutschland, , DE., plus shipping costs
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.
Network Intrusion Detection: An Analyst's Handbook (2nd Edition) - Northcutt, Stephen; McLachlan, Donald; Novak, Judy
book is out-of-stock
(*)
Northcutt, Stephen; McLachlan, Donald; Novak, Judy:
Network Intrusion Detection: An Analyst's Handbook (2nd Edition) - used book

ISBN: 9780735710085

ID: 760345482

Used, Very Good. Satisfaction Guaranteed. Shipped quickly.

Used or antiquarian book Biblio.com
Winter Ventures Inc
Shipping costs: EUR 13.67
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.

Details of the book
Network Intrusion Detection: an Analyst's Handbook

A collection of after-action reports on a variety of network attacks, Network Intrusion Detection enables you to learn from others' mistakes as you endeavor to protect your networks from intrusion. Authors Stephen Northcutt and Judy Novak document real attacks on systems, and highlight characteristics that you--you being a network communications analyst or security specialist--can look for on your own machines. The authors mince no words, and advise you on the detection tools to use (they like and use Snort, as well as Shadow, Tripwire, TCP Wrappers, and others) and how to use them. This second edition of the book includes less about year-2000 preparation and more about the latest in attacks, countermeasures, and the growing community of white-hat hackers who share information to keep systems safe.

In teaching their readers about the attacks that exploit a particular protocol or service, the authors typically present a TCPdump listing that shows an attack, and then comment upon it. They tell you what the attackers did, how successful they were, and how the attack might have been detected and shut down. To cite one example, there's a very detailed analysis of Kevin Mitnick's famous attack (a SYN flood, combined with TCP hijacking) on one of Tsutomu Shimomura's machines. By following the advice in this book, you'll likely do well in protecting your machines against people whom the authors call "script kiddies" --small-time hackers who follow published recipes (or run prewritten routines). Also, you'll be about as prepared as you can be against more skilled attackers who make up their attacks on their own. This is great reading for anyone who's involved in developing filters to ward off attacks or monitoring network communications for suspicious activity. It's also a valuable resource for someone who's evaluating network countermeasures in preparation for deployment. --David Wall

Topics covered: Analysis of TCP/IP traffic, with an eye toward detecting and halting malicious activity, both manually and automatically. Subjects include tools for finding weaknesses and initiating attacks, and the signatures that identify these tools. There's discussion of the vulnerabilities that exist in services, such as IMAP and Domain Name System (DNS).

Details of the book - Network Intrusion Detection: an Analyst's Handbook


EAN (ISBN-13): 9780735710085
ISBN (ISBN-10): 0735710082
Paperback
Publishing year: 2000
Publisher: New Riders Publishing

Book in our database since 15.02.2008 01:18:19
Book found last time on 19.03.2017 10:37:54
ISBN/EAN: 0735710082

ISBN - alternate spelling:
0-7357-1008-2, 978-0-7357-1008-5


< to archive...
Related books