• List Price: $55.00
  • Save: $23.81 (43%)
Rented from Amazon Warehouse Deals
To Rent, select Shipping State from options above
Due Date: Dec 21, 2014
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
Qty:1
  • List Price: $55.00
  • Save: $17.69 (32%)
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Implementing Intrusion De... has been added to your Cart
Trade in your item
Get a $2.00
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network Paperback – December 11, 2002

ISBN-13: 978-0764549496 ISBN-10: 0764549499 Edition: 1st

Buy New
Price: $37.31
Rent
Price: $31.19
24 New from $22.72 20 Used from $21.87
Amazon Price New from Used from
Paperback
"Please retry"
$37.31
$22.72 $21.87
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

$37.31 FREE Shipping. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network + Snort IDS and IPS Toolkit (Jay Beale's Open Source Security)
Price for both: $69.21

One of these items ships sooner than the other.

Buy the selected items together

Customers Who Bought This Item Also Bought

NO_CONTENT_IN_FEATURE

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 336 pages
  • Publisher: Wiley; 1 edition (December 11, 2002)
  • Language: English
  • ISBN-10: 0764549499
  • ISBN-13: 978-0764549496
  • Product Dimensions: 9.1 x 7.5 x 0.8 inches
  • Shipping Weight: 1.5 pounds (View shipping rates and policies)
  • Average Customer Review: 4.8 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #1,124,459 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

Your in-depth guide to implementing and optimizing an effective intrusion detection system for your network

Here’s the in-the-trenches handbook you’ve been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step-by-step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You’ll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS.

Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you’re responsible for network security, this is the guidebook that will help you get a good night’s sleep–at last.

 You’ll learn how to:

  • Implement an effective IDS for host, network, and combined systems
  • Understand challenges like evasion, unknown attacks, and false alerts
  • Verify, test, and fine-tune intrusion detection systems
  • Analyze various IDS products and determine what meets your organization’s needs
  • Cope with legal issues and architectural challenges
  • Identify, verify, and respond to different types of attacks and alerts
  • Investigate security breaches and prevent recurrences

About the Author

TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.8 out of 5 stars
5 star
3
4 star
1
3 star
0
2 star
0
1 star
0
See all 4 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

5 of 5 people found the following review helpful By Richard Bejtlich on January 8, 2003
Format: Paperback
When was the last time you saw a new book on detecting intrusions at your local book store? Aside from revisions of "Network Intrusion Detection" by Northcutt and Novak, the last thought-provoking book was Paul Proctor's "Practical Intrusion Detection Handbook," published in August 2000. In 2003, IDS fans, the drought has ended.
"Implementing Intrusion Detection Systems" (IIDS) is a welcome start to a year that will see four books published with the word "Snort" in their titles. IIDS pays homage to the finest detection engine in the land, but uses Snort as a sample of the capabilities an IDS has to offer -- capabilities frequently attacked in the press and by assessment-oriented companies. Author Tim Crothers tackles the naysayers head-on in the book's second paragraph: "You see media articles from well-known security writers claiming that IDS is a dead technology. Fortunately, those writers are wrong." Amen!
IIDS is clear and straightforward, with a dose of good advice and informative diagrams. The sample IDS deployment chapter was nice to see in a published work, and the evasion section in chapter 5 was well done. Overall Wiley did a fine job editing IIDS and the price is reasonable.

Now for the toughest part of any review -- constructive criticism of technical details. Crothers' discussion of "passive ftp" on p. 39 doesn't recognize that port 20 is only involved in "active ftp". (See pp. 456-7 of "Building Internet Firewalls, 2nd Ed, for a chart to silence all debate on this topic.) Closed tcp ports reply with RST ACKs, not the lone RSTs listed on p. 96. The author doesn't mention that FIN scans (p.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
Implementing Intrusion Detection Systems by Tim Crothers is an excellent introduction to the topics important to implementing any IDS. Crothers uses Snort as a reference IDS system, but the coverage of Snort is not intended to be comprehensive so if you plan to use Snort you will need an additional resource. Crothers does an excellent job of giving a very basic overview of underlying protocol elements that need to be understood to be a competent IDS manager without going into excessive detail for the generalist. Overall this is an excellent introduction to IDS topics. For someone with IDS experience this book will probably be useful in filling in some holes in your knowledge but Network Intrusion Detection by Nortcut and Novak may be a better book for the experienced IDS implementer.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Mesguerra on June 6, 2014
Format: Paperback Verified Purchase
the best book of IDS with snort, best practices and best tips of network analysis of detection intrusion in the company
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Jonathan Bushnell on February 19, 2003
Format: Paperback
This book takes a simplistical approach to understanding IDS systems. I enjoyed the book and really got a grasp on IDS. I've touched basis with IDS before but was able to completely and thouroughly comprehend the main points of the book because of the great technial expertise and writing syle of the book.
Great for security admins!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?