Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It features coverage of the recently revised IETF IDS specification. It covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling. It provides step-by-step instructions for configuration procedures.
- ISBN13 9780470333471
- Publish Date 21 April 2008 (first published 13 December 2002)
- Publish Status Active
- Publish Country US
- Imprint John Wiley & Sons Inc
- Format eBook
- Pages 336
- Language English
- URL http://wiley.com