This superior text on computer security is extremely rich in information, based on experience, and a pleasure to read. In addition, the author is donating part of his royalties from this book to various charities--initially, a foundation that fights child abuse.
Escamilla begins by exploring intrusion prevention systems--firewalls, user authentication routines, and access controls--and telling how to properly set up such systems. He then describes mechanisms that identify and minimize damage caused by electronic break-ins once they occur. The author covers both system-level and network-level intrusion-detection systems, describing tools that attempt to catch not only outsiders who have broken in, but also legitimate system users who are up to no good.
Escamilla details several anti-intruder tools, including packet sniffers and vulnerability scanners. He describes a lot of Unix hacks and tells what you can do to prevent them from taking place on your systems. Other chapters focus on intrusions in Windows NT environments and what to do when your system is under attack. Escamilla closes with references to other sources. --David Wall
From Book News, Inc.
Explains how intrusion detection systems (IDS) fit in with other computer security systems such as encryption and firewalls. Software examples and product descriptions are provided. Chapters cover topics such as traditional security systems, vulnerability scanners, and UNIX system-level IDS. Book News, Inc.®, Portland, OR
Book Description
A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products
Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever on the alert, to sniff out suspicious behavior on your network. This book gives you the additional ammo you need. Terry Escamilla shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense. He provides:
* Assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security
* Recommendations for dramatically improving network security using the right combination of intrusion detection products
* The lowdown on identification and authentication, firewalls, and access control
* Detailed comparisons between today's leading intrusion detection product categories
* A practical perspective on how different security products fit together to provide protection for your network
The companion Web site at www.wiley.com/compbooks/escamilla features: White papers
* Industry news
* Product information
Book Info
Presents a complete nuts & bolts guide to improving network security using today's best intrusion detection products. Paper. DLC: Computer networks - Security measures.
From the Back Cover
A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products
Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever on the alert, to sniff out suspicious behavior on your network. This book gives you the additional ammo you need. Terry Escamilla shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense. He provides: Assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security Recommendations for dramatically improving network security using the right combination of intrusion detection products The lowdown on identification and authentication, firewalls, and access control Detailed comparisons between today's leading intrusion detection product categories A practical perspective on how different security products fit together to provide protection for your network
The companion Web site at www.wiley.com/compbooks/escamilla features: White papers Industry news Product information
About the Author
TERRY ESCAMILLA, PhD, is a Senior Software Architect for IBM Corporation in Boulder, Colorado. He previously worked for Haystack Labs, now part of Network Associates, a leading vendor of intrusion detection products including the Stalker family of products. A well-respected specialist in computer security and software engineering, Dr. Escamilla spent six years with IBM before joining Haystack in 1996. After Haystack was acquired by Trusted Information Systems and then by Network Associates, Dr. Escamilla rejoined IBM to work on e-business solutions.
Intrusion Detection: Network Security Beyond the Firewall ANNOTATION
Designed for corporate security managers, network system designers and Web masters, this practical and objective text introduces and assesses intrusion detection systems (IDS). It reviews IDS problems, requirements and products. Please keep in mind that "intrusion detection" is not synonymous with "firewalls," which is only one aspect of security control.
FROM THE PUBLISHER
This book shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense: assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security; recommendations for dramatically improving network security using the right combination of intrusion detection products; the lowdown on identification and authentication, firewalls, and access control; detailed comparisons between today's leading intrusion detection product categories; and a practical perspective on how different security products fit together to provide protection for your network.
SYNOPSIS
The first ever hands-on guidebook on intrusion detection.
The new intrusion detection products "watch" your network full-time, looking out for suspicious behavior. This how-to book provides clear steps for hardening your network against attacks and leaks. The author teaches you how to distinguish what each product can and can't do to fill your network's particular gaps. Companion Web site features standards updates, industry news, and product information.
FROM THE CRITICS
Booknews
Explains how intrusion detection systems (IDS) fit in with other computer security systems such as encryption and firewalls. Software examples and product descriptions are provided. Chapters cover topics such as traditional security systems, vulnerability scanners, and UNIX system-level IDS. Annotation c. by Book News, Inc., Portland, Or.
AUTHOR DESCRIPTION
Terry Escamilla, PhD, is a Senior Software Architect for IBM Corporation in Boulder, Colorado. He previously worked for Haystack Labs, now part of Network Associates, a leading vendor of intrusion detection products including the Stalker family of products. A well respected specialist in computer security and software engineering, Dr. Escamilla spent six years with IBM before joining Haystack in 1996. After Haystack was acquired by Trusted Information Systems and then by Network Associates, Dr. Escamilla rejoined IBM to work on e-business solutions.