Home | Best Seller | FAQ | Contact Us
Browse
Art & Photography
Biographies & Autobiography
Body,Mind & Health
Business & Economics
Children's Book
Computers & Internet
Cooking
Crafts,Hobbies & Gardening
Entertainment
Family & Parenting
History
Horror
Literature & Fiction
Mystery & Detective
Nonfiction
Professional & Technology
Reference
Religion
Romance
Science
Science Fiction & Fantasy
Sports & Outdoors
Travel & Geography
   Book Info

enlarge picture

Intrusion Detection: Network Security Beyond the Firewall  
Author: Terry Escamilla
ISBN: 0471290009
Format: Handover
Publish Date: June, 2005
 
     
     
   Book Review



This superior text on computer security is extremely rich in information, based on experience, and a pleasure to read. In addition, the author is donating part of his royalties from this book to various charities--initially, a foundation that fights child abuse.

Escamilla begins by exploring intrusion prevention systems--firewalls, user authentication routines, and access controls--and telling how to properly set up such systems. He then describes mechanisms that identify and minimize damage caused by electronic break-ins once they occur. The author covers both system-level and network-level intrusion-detection systems, describing tools that attempt to catch not only outsiders who have broken in, but also legitimate system users who are up to no good.

Escamilla details several anti-intruder tools, including packet sniffers and vulnerability scanners. He describes a lot of Unix hacks and tells what you can do to prevent them from taking place on your systems. Other chapters focus on intrusions in Windows NT environments and what to do when your system is under attack. Escamilla closes with references to other sources. --David Wall


From Book News, Inc.
Explains how intrusion detection systems (IDS) fit in with other computer security systems such as encryption and firewalls. Software examples and product descriptions are provided. Chapters cover topics such as traditional security systems, vulnerability scanners, and UNIX system-level IDS. Book News, Inc.®, Portland, OR


Book Description
A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products

Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever on the alert, to sniff out suspicious behavior on your network. This book gives you the additional ammo you need. Terry Escamilla shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense. He provides:
* Assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security
* Recommendations for dramatically improving network security using the right combination of intrusion detection products
* The lowdown on identification and authentication, firewalls, and access control
* Detailed comparisons between today's leading intrusion detection product categories
* A practical perspective on how different security products fit together to provide protection for your network

The companion Web site at www.wiley.com/compbooks/escamilla features: White papers
* Industry news
* Product information


Book Info
Presents a complete nuts & bolts guide to improving network security using today's best intrusion detection products. Paper. DLC: Computer networks - Security measures.


From the Back Cover
A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products

Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever on the alert, to sniff out suspicious behavior on your network. This book gives you the additional ammo you need. Terry Escamilla shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense. He provides: Assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security Recommendations for dramatically improving network security using the right combination of intrusion detection products The lowdown on identification and authentication, firewalls, and access control Detailed comparisons between today's leading intrusion detection product categories A practical perspective on how different security products fit together to provide protection for your network

The companion Web site at www.wiley.com/compbooks/escamilla features: White papers Industry news Product information


About the Author
TERRY ESCAMILLA, PhD, is a Senior Software Architect for IBM Corporation in Boulder, Colorado. He previously worked for Haystack Labs, now part of Network Associates, a leading vendor of intrusion detection products including the Stalker family of products. A well-respected specialist in computer security and software engineering, Dr. Escamilla spent six years with IBM before joining Haystack in 1996. After Haystack was acquired by Trusted Information Systems and then by Network Associates, Dr. Escamilla rejoined IBM to work on e-business solutions.




Intrusion Detection: Network Security Beyond the Firewall

ANNOTATION

Designed for corporate security managers, network system designers and Web masters, this practical and objective text introduces and assesses intrusion detection systems (IDS). It reviews IDS problems, requirements and products. Please keep in mind that "intrusion detection" is not synonymous with "firewalls," which is only one aspect of security control.

FROM THE PUBLISHER

This book shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense: assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security; recommendations for dramatically improving network security using the right combination of intrusion detection products; the lowdown on identification and authentication, firewalls, and access control; detailed comparisons between today's leading intrusion detection product categories; and a practical perspective on how different security products fit together to provide protection for your network.

SYNOPSIS

The first ever hands-on guidebook on intrusion detection.

The new intrusion detection products "watch" your network full-time, looking out for suspicious behavior. This how-to book provides clear steps for hardening your network against attacks and leaks. The author teaches you how to distinguish what each product can and can't do to fill your network's particular gaps. Companion Web site features standards updates, industry news, and product information.

FROM THE CRITICS

Booknews

Explains how intrusion detection systems (IDS) fit in with other computer security systems such as encryption and firewalls. Software examples and product descriptions are provided. Chapters cover topics such as traditional security systems, vulnerability scanners, and UNIX system-level IDS. Annotation c. by Book News, Inc., Portland, Or.

AUTHOR DESCRIPTION

Terry Escamilla, PhD, is a Senior Software Architect for IBM Corporation in Boulder, Colorado. He previously worked for Haystack Labs, now part of Network Associates, a leading vendor of intrusion detection products including the Stalker family of products. A well respected specialist in computer security and software engineering, Dr. Escamilla spent six years with IBM before joining Haystack in 1996. After Haystack was acquired by Trusted Information Systems and then by Network Associates, Dr. Escamilla rejoined IBM to work on e-business solutions.

     



Home | Private Policy | Contact Us
@copyright 2001-2005 ReadingBee.com