Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich (Paperback, 2005)
Brand newLOWEST PRICE
- AU $82.47+ AU $10.00 postage
- Brand new condition
- Sold by roxy*books
- See details for delivery est.
- AU $36.95+ AU $50.00 postage
- Good condition
- Sold by ausreseller
- See details for delivery est.
All listings for this product
Best-selling in Textbooks
Save on Textbooks
- AU $27.54Trending at AU $43.90
- AU $80.99Trending at AU $87.85
- AU $72.90Trending at AU $77.47
- AU $71.88Trending at AU $73.18
- AU $82.89Trending at AU $85.35
- AU $72.90Trending at AU $79.34
- AU $34.77Trending at AU $42.60
About this product
- DescriptionOvercome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software. Hardening your network perimeter won't solve this problem. You must systematically protect client software and monitor the traffic it generates. Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument networks to detect amalies in outgoing traffic, architect networks to resist internal attacks, and respond effectively when attacks occur. Bejtlich's The Tao of Network Security Monitoring earned acclaim as the definitive guide to overcoming external threats. Now, in Extrusion Detection, he brings the same level of insight to defending against today's rapidly emerging internal threats. Whether you're an architect, analyst, engineer, administrator, or IT manager, you face a new generation of security risks. Get this book and protect yourself. Coverage includes * Architecting defensible networks with pervasive awareness: theory, techniques, and tools * Defending against malicious sites, Internet Explorer exploitations, bots, Trojans, worms, and more * Dissecting session and full-content data to reveal unauthorized activity * Implementing effective Layer 3 network access control * Responding to internal attacks, including step-by-step network forensics * Assessing your network's current ability to resist internal attacks * Setting reasonable corporate access policies * Detailed case studies, including the discovery of internal and IRC-based bot nets * Advanced extrusion detection: from data collection to host and vulnerability enumeration About the Web Site Get book updates and network security news at Richard Bejtlich's popular blog, taosecurity.blogspot.com, and his Web site, www.bejtlich.net.
- Author BiographyRichard Bejtlich is founder of TaoSecurity, a company that helps clients detect, contain, and remediate intrusions using Network Security Monitoring (NSM) principles. He was formerly a principal consultant at Foundstone--performing incident response, emergency NSM, and security research and training--and created NSM operations for ManTech International Corporation and Ball Aerospace & Technologies Corporation. For three years, Bejtlich defended U.S. information assets as a captain in the Air Force Computer Emergency Response Team (AFCERT). Formally trained as an intelligence officer, he is a graduate of Harvard University and of the U.S. Air Force Academy. He has authored or coauthored several security books, including The Tao of Network Security Monitoring (Addison-Wesley, 2004).
- Author(s)Richard Bejtlich
- PublisherPearson Education (US)
- Date of Publication08/11/2005
- SubjectComputing: Professional & Programming
- Place of PublicationNew Jersey
- Country of PublicationUnited States
- ImprintAddison-Wesley Educational Publishers Inc
- Content NoteIllustrations
- Weight467 g
- Width177 mm
- Height234 mm
- Spine26 mm
This item doesn't belong on this page.
Thanks, we'll look into this.