Wonder Club world wonders pyramid logo
×

Network intrusion detection Book

Network intrusion detection
Network intrusion detection, Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, North, Network intrusion detection has a rating of 3.5 stars
   2 Ratings
X
Network intrusion detection, Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, North, Network intrusion detection
3.5 out of 5 stars based on 2 reviews
5
0 %
4
50 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Network intrusion detection
  • Written by author Judy Novak,Stephen Northcutt
  • Published by Indianapolis, Ind. : New Riders, 2000, c2001., 2000/09/19
  • Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, North
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

I TCP/IP
1 IP Concepts 3
2 Introduction to TCPdump and TCP 23
3 Fragmentation 43
4 ICMP 57
5 Stimulus and Response 79
6 DNS 103
II Traffic Analysis
7 Packet Dissection Using TCPdump 125
8 Examining IP Header Fields 143
9 Examining Embedded Protocol Header Fields 161
10 Real-World Analysis 185
11 Mystery Traffic 203
III Filters/Rules for Network Monitoring
12 Writing TCPdump Filters 221
13 Introduction to Snort and Snort Rules 237
14 Snort Rules - Part II 249
IV Intrusion Infrastructure
15 Mitnick Attack 273
16 Architectural Issues 291
17 Organizational Issues 319
18 Automated and Manual Response 339
19 Business Case for Intrusion Detection 359
20 Future Directions 379
App. A Exploits and Scans to Apply Exploits 401
App. B Denial of Service 425
App. C Ctection of Intelligence Gathering 439
Index 465


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Network intrusion detection, Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, North, Network intrusion detection

X
WonderClub Home

This item is in your Collection

Network intrusion detection, Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, North, Network intrusion detection

Network intrusion detection

X
WonderClub Home

This Item is in Your Inventory

Network intrusion detection, Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, North, Network intrusion detection

Network intrusion detection

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: