Intrusion Prevention and Active Response: Deploying Network and Host IPS

Intrusion Prevention and Active Response: Deploying Network and Host IPS
Publisher: Syngress | ISBN: 193226647X | edition 2005 | File type: PDF | 425 pages | 82,5 mb
Within a year of the infamous quot;Intrusion Detection is Deadquot; report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercial and open source intrusion prevention solutions. This is the first book-length work that specifically concentrates on the concept, implementation, and implications of intrusion prevention and active response. The term IPS has been thrown around with reckless abandon by the security community. Here, the author team works to establish a common understanding and terminology, as well as compare the approaches to intrusion prevention.

[Fast Download] Intrusion Prevention and Active Response: Deploying Network and Host IPS

Related eBooks:
Human-Computer Interaction and Cybersecurity Handbook (Human Factors and Ergonomics)
From CIA to APT: An Introduction to Cyber Security
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection
Non-Traditional Security in Asia: Dilemmas in Securitization
Reasonable Cybersecurity for Business Leaders
Group-based Cryptography
Trust and Security in Collaborative Computing (Computer and Network Security)
Security Engineering: A Guide to Building Dependable Distributed Systems, 2 edition
CISSP : Certified Information Systems Security Professional Study Guide
Terrorist Criminal Enterprises: Financing Terrorism Through Organized Crime
Confidence Building in Cyberspace
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.