INTRUSION DETECTION BY REBECCA GURLEY BACE PDF

About this title With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever. Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers: practical considerations for selecting and implementing intrusion detection systems; methods of handling the results of analysis, and the options for responses to detected problems, data sources commonly used in intrusion detection and how they influence the capabilities of all intrusion detection systems; legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems. More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed discussion of the vulnerabilities inherent in many systems, and approaches to testing systems for these problems. Becky Bace has been there, done that, read about it, thought about it a lot, and now written it all down. Everyone who works in intrusion detection can gain something by reading this book. You can, too.

Author:Mitaur Kagalmaran
Country:Laos
Language:English (Spanish)
Genre:Relationship
Published (Last):4 March 2005
Pages:16
PDF File Size:16.31 Mb
ePub File Size:12.64 Mb
ISBN:898-4-49152-524-1
Downloads:22229
Price:Free* [*Free Regsitration Required]
Uploader:Bratilar



Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers: practical considerations for selecting and implementing intrusion detection systems; methods of handling the results of analysis, and the options for responses to detected problems, data sources commonly used in intrusion detection and how they influence the capabilities of all intrusion detection systems; legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems.

More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed discussion of the vulnerabilities inherent in many systems, and approaches to testing systems for these problems.

Heiser on Apr 06, This is a well-researched and well-written text. Every specialized text on security seems to succumb to the temptation to flesh out the book with elementary security topics, and this one is no exception. Whether they are absolutely appropriate in a book like this or not, Bace does offer some very wise and useful advice and understandings on information security in general--some of which I was able to apply immediately by sharing with a client.

The author provides a comprehensive history of intrusion detection that is effective in creating an understanding of the reasons that specific techniques are used and what their shortcomings and strong points are years worth of non-commercial intrusion detection systems are described and analyzed. While academic and government sponsored IDS initiatives are well-covered, those who are shopping for a commercial solution will probably be disappointed by the almost total lack of mention of currently available products.

Discussion of commercial products consists of generalizations such as "Many products" or "some products" or "be aware of vendors that". The chapter on legal issues is excellent and up-to-date, and it should be read by anyone implementing any form of monitoring system. The bibliography is complete and very current.

Although it lacks annotations, many of the sources are referenced within the book itself, so the reader interested in further research has plenty of guidance. The weaknesses in this book are probably due to a lack of audience focus.

It is aimed at Chief Security Officers, network and OS admins, college compsci students, and security systems designers. Consultants and decision-makers should read this text, as should network engineers who want to expand their awareness of the tools they are purchasing and using.

Given that this serves well as a reference book, the sturdy hard binding is appreciated, and the pages withstand highlighting without bleed through. Now, I consider her book so important that I consider most of it mandatory preparation for my own book. Most of them are so clear as to be considered definitive in my eyes. The best aspect of the book, for my purposes, is its historical nature.

Bace covers several decades of intrusion detection concepts and products. She cites the players and their papers, and the themes prevalent as IDS moved from the lab to the front lines. I also found the legal issues chapter extremely valuable. The legal chapter also featured two great case studies on capturing Kevin Mitnick and responding to the Rome Labs intrusion. On the negative side, I offer a few disagreements and suggestions.

First, vulnerability assessment products are not "a special case of intrusion detection" ch. This association clouds the issue and confuses the layman. Vulnerability assessment products identify vulnerabilities. Intrusion detection products identify threats. I also disagree the a primary goal of IDS is real-time response. Minor points include a lack of discussing Snort created in , popular by and an incorrect claim regarding "NSM" on p.

This is an academic book By C. Langin on Jul 15, This is one of at least three books you will need for academic research on intrusion detection. This book is appropriate for undergraduate students, but it also contains theory and references. The third book is Network Intrusion Detection 3rd Edition Voices New Riders and contains practical advice on how intrusion detection is actually done. If you are non-academic and do not need theory and references, you probably only need the third book.

Simply put, an intrusion detection system IDS is a type of network security management system that gathers and analyzes information to identify possible security breaches, which include both intrusions attacks from outside the organization and misuse attacks from within the organization. IDSs, which were developed in response to an increasing number of attacks on such major sites as the White House and Microsoft, use vulnerability assessment and scanning technologies to determine the security of a network.

Bace further details how to respond to specific types of intrusions and how to tie all of this back to an effective security infrastructure. Informative and not a dry read By Icode4food on May 15, I thoroughly enjoyed this book which was the required textbook for my IDS graduate level class.

Easy to read. Lots of history and current information as well. I loved seeing all citations for work which originated at Purdue, where I studied undergrad. Boiler up!

Was a real treat to see my professor in undergrad cited : Vitally important reading. By Midwest Book Review on Apr 05, With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever.

Intrusion Detection offers both a developmental and technical perspective on this crucial element of network security. Ideal for the network architect who has to make decisions on what intrusion detection system to implement and how to do it. This particular edition is in a Hardcover format. This books publish date is Unknown. To buy this book at the lowest price, Click Here. Similar Books.

ISO 17356-5 PDF

Rebecca Bace

.

CAUTIVA Y SEDUCIDA DESCARGAR PDF

ISBN 13: 9781578701858

.

2SK1117 DATASHEET PDF

Intrusion Detection

.

Related Articles