By Christopher Kruegel
Details how intrusion detection works in community protection with comparisons to standard tools similar to firewalls and cryptography
Analyzes the demanding situations in analyzing and correlating Intrusion Detection alerts
Read or Download Intrusion Detection and Correlation: Challenges and Solutions (Advances in Information Security) PDF
Best Comptia books
Crucial talents for IT professionalsMike Meyers A+ consultant to notebook Lab handbook, moment variation beneficial properties 40-plus lab routines that problem you to resolve difficulties according to practical case experiences and step by step eventualities that require severe pondering. you will additionally get post-lab commentary questions that degree your knowing of lab effects and key time period quizzes that support construct vocabulary.
A textbook for newbies in safety. during this new first version, famous writer Behrouz Forouzan makes use of his available writing variety and visible method of simplify the tough options of cryptography and community safeguard. This variation additionally offers an internet site that comes with Powerpoint records in addition to teacher and scholars strategies manuals.
Linux Routers, moment variation exhibits you precisely the way to decrease your expenses and expand your community with Linux-based routing. you can find step by step assurance of software/hardware choice, configuration, administration, and troubleshooting for modern-day key internetworking functions, together with LANs, Internet/intranet/extranet routers, body Relay, VPNs, distant entry, and firewalls.
WebDAV: Next-Generation Collaborative net Authoring is the entire advisor to Web-based disbursed Authoring and Versioning (WebDAV), the IETF normal for net authoring and huge zone collaboration. skilled implementer Lisa Dusseault covers WebDAV from bits at the twine as much as customized program implementation, demonstrating with large examples and strains from genuine consumers and servers.
Extra info for Intrusion Detection and Correlation: Challenges and Solutions (Advances in Information Security)