Intrusion Signatures and Analysis Book + PRICE WATCH * Amazon pricing is not included in price watch

Intrusion Signatures and Analysis Book

Stephen Northcutt and coauthors note in the superb Network Intrusion Detection that there's really no such thing as an attack that's never been seen before. The book documents scores of attacks on systems of all kinds, showing exactly what security administrators should look for in their logs and commenting upon attackers' every significant command. This is largely a taxonomy of hacker strategies and the tools used to implement them. As such, it's an essential tool for people who want to take a scientific, targeted approach to defending information systems. It's also a great resource for security experts who want to earn their Certified Intrusion Analyst ratings from the Global Incident Analysis Centre (GIAC)--it's organised, in part, around that objective. The book typically introduces an attack strategy with a real-life trace--usually attributed to a real administrator--from TCPdump, Snort or some sort of firewall (the trace's source is always indicated). The trace indicates what is happening (i.e. what weakness the attacker is trying to exploit) and the severity of the attack (using a standard metric that takes into account the value of the target, the attack's potential to do damage, and the defences arrayed against the attack). The attack documentation concludes with recommendations on how defences could have been made stronger. These pages are great opportunities to learn how to read traces and take steps to strengthen your systems' defences. The book admirably argues that security administrators should take some responsibility for the greater good of the Internet by, for example, using egress filtering to prevent people inside your networks from spoofing their source address (thus defending other networks from your own users' malice). The authors (and the community of white-hat security specialists that they represent) have done and continue to do a valuable service to all Internet users. Supplement this book with Northcutt's excellent Network Intrusion Detection, which takes a more general approach to log analysis, less focused on specific attack signatures. --David Wall Topics covered: external attacks on networks and hosts, as they appear to administrators and detection systems monitoring log files how to read log files generally how to report attacks and interact with the global community of good-guy security specialists the most commonplace critical security weaknesses traces that document reconnaissance probes denial-of-service attacks trojans overflow attacks ther black-hat strategiesRead More

from£N/A | RRP: £30.99
* Excludes Voucher Code Discount Also available Used from £N/A
As an Amazon Associate we earn from qualifying purchases. If you click through any of the links below and make a purchase we may earn a small commission (at no extra cost to you). Click here to learn more.

Would you like your name to appear with the review?

We will post your book review within a day or so as long as it meets our guidelines and terms and conditions. All reviews submitted become the licensed property of www.find-book.co.uk as written in our terms and conditions. None of your personal details will be passed on to any other third party.

All form fields are required.