Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
“Practical Intrusion Analysisprovides a solid fundamental overview of the art and science of intrusion analysis.
-Nate Miller, Cofounder, Stratum Security
The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. InPractical Intrusion Analysis, one of the field's leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers.
Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today's new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more.
Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes
Includes contributions from these leading network security experts:
Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker
Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor ofSecurity Warrior
Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief,Journal of Computer Security
Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University
Alex Kirk, Member, Sourcefire Vulnerability Research Team
Ryan Trost is the Director of Security and Data Privacy Officer at Comprehensive Health Services where he oversees all the organization’s security and privacy decisions. He teaches several Information Technology courses, including Ethical Hacking, Intrusion Detection, and Data Visualization at Northern Virginia Community College. This enables him to continue exploring his technical interests among the endless managerial meetings. In his spare time, Ryan works to cross-pollinate network security, GIS, and data visualization. He is considered a leading expert in geospatial intrusion detection techniques and has spoken at several conferences on the topic, most notably DEFCON 16. Ryan participated as a RedTeamer in the first annual Collegiate Cyber Defense Competition (CCDC) and now fields a team of students in the annual event. Ryan has been a senior security consultant for several government agencies before transitioning over to the private sector. In 2005, Ryan received his masters of science degree in computer science from George Washington University where he developed his first geospatial intrusion detection tool.
The author of this book believes that everyone from an entry-level security analyst to a chief security officer to a prospective college student researching a career in network... Read morePublished 11 months ago by ~Cathy
Overall the concepts are explained very well. However, Key terms, definitions and concepts could be highlighted at the end of each sections along with a q & a to help with the... Read morePublished on July 16, 2013 by Christina L. Parker
I bought this book for my Kindle app on my IPad. Best technical book I've read in a while. If you are studying cyber security and looking at learning more about the access control... Read morePublished on January 11, 2013 by mike
Ryan Trost presents an interesting book on intrusion analysis from the standpoint f both an observer and practitioner. Read morePublished on January 8, 2013 by D. Clyborne
So I've read the other reviews, and the complaints people have cited when only giving the book a 3 of 5 star review. Read morePublished on October 1, 2011 by saiello
...which actually is a lot to say since I've been diagnosed with ADHD for the better part of my life! Read morePublished on August 12, 2009 by Sam Wong
I really enjoyed the book :: cover to cover. I also enjoyed that the book didn't focus on hardware/OS specific examples. Read morePublished on August 12, 2009 by GOVSOC
Practical Intrusion Analysis is a good primer for those just starting in the field of intrusion detection and analysis. Read morePublished on August 12, 2009 by T. Prevatte