Free Shipping in Australia on over 5 million books in stock
Intrusion Signatures and Analysis By Matt Fearnow

Intrusion Signatures and Analysis

Used Price
inc. GST
Free Shipping in Australia
Teaches students about the concepts of intrusion detection and network security. This book opens with an introduction into the format of some of the common detection sensors and then begins a tutorial into the format of the signatures and analyses used in the book. It is useful for advanced courses in network security.

Only 2 left

Intrusion Signatures and Analysis Summary

Intrusion Signatures and Analysis by Matt Fearnow

Intrusion Signatures and Analysis opens with an introduction into the format of some of the more common sensors and then begins a tutorial into the unique format of the signatures and analyses used in the book. After a challenging four-chapter review, the reader finds page after page of signatures, in order by categories. Then the content digs right into reaction and responses covering how sometimes what you see isn?t always what is happening. The book also covers how analysts can spend time chasing after false positives. Also included is a section on how attacks have shut down the networks and web sites of Yahoo, and E-bay and what those attacks looked like. Readers will also find review questions with answers throughout the book, to be sure they comprehend the traces and material that has been covered.

Customer Reviews - Intrusion Signatures and Analysis

Why buy from World of Books

Our excellent value books literally don't cost the earth
Free delivery in Australia
Read more here
Every used book bought is one saved from landfill

About Matt Fearnow

Stephen Northcutt is the author of several books including: Incident Handling Step-by-Step, Intrusion Detection: Shadow Style (both by the SANS Institute) and Network Intrusion Detection: An Analyst's Handbook (New Riders) as well as a contributing editor for Securing NT Step-by-Step (The SANS Institute.) He was the original developer of the Shadow intrusion detection system and served as the leader of the Department of Defenses Shadow Intrusion Detection Team for two years. Mr. Northcutt was the Chief for Information Warfare at the Ballistic Missile Defense Organization and currently serves as the Director for GIAC Training and Certification for the SANS Institute. Mark Cooper graduated from UMIST in 1991 with a BS in Microelectronic Systems Engineering. Currently working as a security consultant, he reached his current position after spending many years as a software engineer and then as a UNIX Systems Administrator. He is now a SANS GIAC Certified Intrusion Analyst. Matt Fearnow is a Network/ Security Administrator for Macmillan USA. Before working at Macmillan, he served in the US Navy as a Sonar Technician aboard submarines. In his current duties he constantly utilizes his SANS GIAC certification and is a frequent contributor to the SANS GIAC website. Matt was the first to establish categories for the traces from completed GIAC practicals. Karen Frederick is an Infosec Engineer for Sun Tzu Security in Milwaukee, Wisconsin. She earned her bachelor's degree in computer science from the University of Wisconsin-Parkside, and she is currently completing her master's degree thesis in intrusion detection from the University of Idaho's Engineering Outreach program. Karen holds several certifications, including Microsoft Certified Systems Engineer + Internet, Check Point Certified Security Administrator and GIAC Certified Intrusion Analyst.

Table of Contents

1. Reading Log Formats.

2. Introduction to the Practicals.

3. The Ten Most Critical Internet Security Threats, Part 1.

4. The Ten Most Critical Internet Security Threats, Part 2.

5. Reactions and Responses.

6. Perimeter Logs.

7. Non-Malicious Traffic.

8. Network Mapping.

9. Scans that Probe Systems for Information.

10. Denial Of Service (DoS)-Resource Starvation.

11. Denial Of Service (DoS)-Bandwidth Consumption.

12. Trojans.

13. Exploits.

14. Buffer Overflows with Content.

15. Fragmentation.

16. False Positives.

17. Out of Spec Packets.

Additional information

Intrusion Signatures and Analysis by Matt Fearnow
Matt Fearnow
Used - Very Good
Pearson Education (US)
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us.