Protect your information with intrusion detection

Protect your information with intrusion detection

4.11 - 1251 ratings - Source

This comprehensive reference provides a detailed overview of intrusion detection systems (IDS) offering the latest technology in information protection. Introducing network administrators to the problem of intrusion detection, it includes the principles of system technology and an in-depth classification in IDS. Topics covered include information gathering and exploitation, searching for vulnerabilities, distributed attack tools, remote and local penetrations, and password crackers, sniffers, and firewalls. Examples of actual information system break-ins provide practical reference.... system for each segment (switch), which is prohibitively expensive, or attempt to solve the problem of detecting intrusions and reacting to them using other methods. ... example, RealSecure for Nokia or Cisco Catalyst 6500 IDS Module).

Title:Protect your information with intrusion detection
Author: A. Lukatsky
Publisher:БХВ-Петербург - 2002

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA