Qty:1
  • List Price: $50.00
  • Save: $8.55 (17%)
Only 3 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Used: Very Good | Details
Sold by Book Robot
Condition: Used: Very Good
Comment: One smudge on closed paper edge. Pages are not written on. Minimal shelf wear to cover.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Intrusion Detection Paperback – January 1, 2000


See all 3 formats and editions Hide other formats and editions
Amazon Price New from Used from
Hardcover
"Please retry"
$28.13
Paperback
"Please retry"
$41.45
$15.88 $0.02
Best%20Books%20of%202014

Frequently Bought Together

Intrusion Detection + Firewalls and Internet Security: Repelling the Wily Hacker (2nd Edition)
Price for both: $76.21

One of these items ships sooner than the other.

Buy the selected items together
NO_CONTENT_IN_FEATURE

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 368 pages
  • Publisher: Sams Publishing; 1 edition (January 1, 2000)
  • Language: English
  • ISBN-10: 1578701856
  • ISBN-13: 978-1578701858
  • Product Dimensions: 7.2 x 0.8 x 9.1 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Best Sellers Rank: #1,543,349 in Books (See Top 100 in Books)

Editorial Reviews

Review

Security books, quite frankly, are pretty much a dime a dozen, most of which are written by people in IT field security. What immediately separates this book from the rest is the background of the author. Ms. Bace is an ex-government employee, spending 12 years in everyone's favorite spook organization, the National Security Agency. ...For those with functioning brains who have vested interests in InfoSec and protecting their organization from people who wish to do harm, and getting real security info ...then pick this book up. -- Slashdot.org, 1/27/2000

What differentiates Bace as an author is her purist's passion for intellectual honesty and generosity. She pays homage to the many computer security folks who preceded her, who do important, innovative work in this area, but seldom get singled out. Reading Bace's opening chapter on the history of intrusion detection is a pleasure...(Throughout the book) the technical-theoretical is balanced by real examples and real-world challenges. Her chapter dealing with legal issues should be read by every in-house attorney whose companies have hard/software components. Outside computer security firms hoping for "consulting" fees will probably memorize large chunks from the book in order to appear knowledgeable. -- CyberWire Dispatch, 1/4/2000

From the Inside Flap

What we're hearing from reviewers about Intrusion Detection... "People have been working on computer intrusion detection systems for nearly 20 years. As a researcher, I am bothered that other scientists aren't familiar with the good work that has already been done, and as a consumer, I am disconcerted that I don't have better commercial products to defend my systems. Becky Bace has been there, done that, read about it, thought about it a lot, and now written it all down. Everyone who works in intrusion detection can gain something by reading this book. You can, too." -- Eugene H. Spafford, Professor and Director of the Purdue University Center for Education and Research in Information and Security (CERIAS)

"This book serves as a fantastic reference for the history of commercial and research intrusion detection tools. Even for practitioners of intrusion detection, this book can be an eye-opener.

"Becky's book grounds the intrusion detection discussion in a way that is readable, informative, and practical." -- Gene Kim, Chief Technology Officer, Tripwire Security Systems, Inc.

"I cannot imagine a consulting expert in this field who will want to be without a copy of Becky's book. Corporate managers, directors, and legal counsel need to digest these arguments as well." -- Fred Chris Smith, Attorney, Santa Fe, New Mexico.

" There is plenty here to point the needful System Administrator in the direction of an intrusion detection system appropriate for his current envisioned needs. But this book does much more: It provides solid perspective in a field where empty claims often dominate, and it will provide insights needed to cope with situations where existing products fall short or fail altogether to protect a system. I am certain that this book will become an industry standard in intrusion detection as a discipline." -- Marvin Schaefer, Chief Scientist, Vice-President, Arca Systems

"This book bridges a critical gap in the reference market. It encompasses both the principles of intrusion detection and a wealth of specific examples, enabling the reader to form a sound basis for understanding and evaluating what is happening in the field. This book demystifies intrusion detection without oversimplifying the problem" -- Ruth Nelson, President, Information System Security


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.5 out of 5 stars
5 star
3
4 star
3
3 star
0
2 star
0
1 star
0
See all 6 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

35 of 36 people found the following review helpful By J. G. Heiser on April 6, 2000
Format: Paperback Verified Purchase
This is a well-researched and well-written text. It is an excellent complement to Northcutt's book, which is more concrete and oriented to the hands-on practitioner. Those hoping to just buy an off-the-shelf IDS and turn it on may find Bace's book somewhat abstract. Although it reads well, it has a very strong academic flavor (this is probably inevitable in any book that uses the word 'etiology' twice in the first chapter). If Amoroso's book is a graduate-level text, then this is an appropriate book for undergrads.
Every specialized text on security seems to succumb to the temptation to flesh out the book with elementary security topics, and this one is no exception. Whether they are absolutely appropriate in a book like this or not, Bace does offer some very wise and useful advice and understandings on information security in general--some of which I was able to apply immediately by sharing with a client.
The author provides a comprehensive history of intrusion detection that is effective in creating an understanding of the reasons that specific techniques are used and what their shortcomings and strong points are--15 years worth of non-commercial intrusion detection systems are described and analyzed. While academic and government sponsored IDS initiatives are well-covered, those who are shopping for a commercial solution will probably be disappointed by the almost total lack of mention of currently available products. Discussion of commercial products consists of generalizations such as "Many products" or "some products" or "be aware of vendors that".
The chapter on legal issues is excellent and up-to-date, and it should be read by anyone implementing any form of monitoring system.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 6 people found the following review helpful By Richard Bejtlich on October 16, 2003
Format: Paperback
Three years ago, as a captain in the Air Force CERT, I didn't think I had time to read books on theory and definitions like Rebecca Bace's "Intrusion Detection." If a book didn't show packet captures, I didn't need it! Fast forward to 2003, as I research intrusion detection history and re-discover Bace's contribution to the field. Now, I consider her book so important that I consider most of it mandatory preparation for my own book. If you've got the time for "high level" monitoring concerns, check out "Intrusion Detection."
As a researcher, my favorite aspect of the book is Bace's readiness to "lay down the law" and provide numerous definitions for intrusion detection concepts. Most of them are so clear as to be considered definitive in my eyes. Like Paul Proctor's 2001 title "The Practical Intrusion Detection Handbook," I get the sense that Bace "gets it." She doesn't show packet traces, but what she says makes sense.
The best aspect of the book, for my purposes, is its historical nature. Bace covers several decades of intrusion detection concepts and products. She cites the players and their papers, and the themes prevalent as IDS moved from the lab to the front lines. I also found the legal issues chapter extremely valuable. IDS operators should know their products implement wiretaps or trap and trace/pen registers, for which legal cover should be sought. The legal chapter also featured two great case studies on capturing Kevin Mitnick and responding to the 1994 Rome Labs intrusion.

On the negative side, I offer a few disagreements and suggestions. First, vulnerability assessment products are not "a special case of intrusion detection" (ch. 6).
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By C. Langin on July 15, 2008
Format: Paperback Verified Purchase
This is one of at least three books you will need for academic research on intrusion detection. This book is appropriate for undergraduate students, but it also contains theory and references. For a graduate level presentation with theory and references, see Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response. The third book is Network Intrusion Detection (3rd Edition) (Voices (New Riders)) and contains practical advice on how intrusion detection is actually done. If you are non-academic and do not need theory and references, you probably only need the third book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?