V okencu izberite šolo in razred v prihodnjem šolskem letu in prihranite

.
 
.

Practical Intrusion Analysis

Avtor:

.
Redna cena: 50,35 €
Rok dobave: 2-4 dni.
.
.
.
Količina:  
.
Strošek dostave je enoten za celo Slovenijo in znaša 2,95 €, ne glede na količino in vrsto kupljenih izdelkov.

Številni izdelki imajo oznako "brezplačna dostava", kar pomeni, da v prmeru nakupa takšnega izdelka poštnine ne boste plačali. 

Več o dostavi
Emka.si omogoča naslednje načine plačila:
  • z gotovino ob prevzemu (velja le za fizične osebe),
  • s plačilno oziroma kreditno kartico (Mastercard, Visa, ActivaMaestro, Activa, Diners, American Express),
  • s storitvijo Moneta (Mobitel in Simobil)
  • Plačilo po predračunu (pravne osebe)
  • Račun z odlogom plačila (za javna podjetja)
Več o plačilih

Pri vsakem izdelku je naveden predviden rok dostave. Glede na to katere izdelke izberete, se vam pri oddaji naročila prikaže tudi končni predviden datum dobave vašega pakete.

Večino izdelkov dostavljamo iz lastne zaloge, zato so naši dobavni roki zelo kratki.

Ko vam bomo poslali paket boste o tem obveščeni tudi po emailu. V emailu bo navedena številka vašega paketa ter povezava do Pošte Slovenije, kjer boste lahko preverili natančen status dostave.

Več o dostavi

To je spletna cena
Shrani v seznam želja
.

.

Opis

Prevention and Detection for the Twenty-First Century



"Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis." --Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field's leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today's new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more.; Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes *Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies*Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions*Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks*Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls*Implementing IDS/IPS systems that protect wireless data traffic*Enhancing your intrusion detection efforts by converging with physical security defenses*Identifying attackers' "geographical fingerprints" and using that information to respond more effectively*Visualizing data traffic to identify suspicious patterns more quickly*Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a.; Rain Forest Puppy, senior security professional and creator of libwhisker Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University Alex Kirk, Member, Sourcefire Vulnerability Research Team

Preface xv Chapter 1: Network Overview 1 Chapter 2: Infrastructure Monitoring 31 Chapter 3: Intrusion Detection Systems 53 Chapter 4: Lifecycle of a Vulnerability 87 Chapter 5: Proactive Intrusion Prevention and Response via Attack Graphs 119 Chapter 6: Network Flows and Anomaly Detection 151 Chapter 7: Web Application Firewalls 185 Chapter 8: Wireless IDS/IPS 209 Chapter 9: Physical Intrusion Detection for IT 235 Chapter 10: Geospatial Intrusion Detection 275 Chapter 11: Visual Data Communications 347 Chapter 12: Return on Investment: Business Justification 391 Appendix: Bro Installation Guide 435 Index 441
.
.
.

O avtorju - Ryan Trost

Obvestite me o novi knjigi tega avtorja

Želite, da vas po elektronski pošti obvestimo, ko izide nova knjiga ali ponatis katere od knjig tega avtorja?

DA - obveščajte me o novostih avtorja
.
.
.
.

Podrobnosti o izdelku

  • Obseg/št. strani: 480
  • Datum Izida:
  • Jezik: angleški
  • Vezava: Mehka
  • ISBN/EAN: 9780321591807
  • Mere izdelka vxš: 23,5 x 17,8 cm
  • Založba Addison Wesley
  • Avtor:
  • Povprečna ocena:
    Ocena kupcev: 0
    (0)

Mnenja kupcev

  0  ocen:
5 zvezdice
0%
(0)
4 zvezdice
0%
(0)
3 zvezdice
0%
(0)
2 zvezdice
0%
(0)
1 zvezdica
0%
(0)
Povprečna ocena kupcev:
Ocena kupcev: 0
(0 ocen uporabnikov )
.
Ocenite izdelek s klikom na zvezdice:
 
.
.
.
.
.

Oznake kupcev o tem izdelku

Kliknite na posamezno oznako za prikaz vseh izdelkov označenih s to oznako:

Dodaj oznako:

Dodaj
.