Intrusion Signatures and Analysis
暫譯: 入侵特徵與分析
Matt Fearnow, Stephen Northcutt, Karen Frederick, Mark Cooper
- 出版商: New Riders
- 出版日期: 2001-01-19
- 售價: $1,610
- 貴賓價: 9.5 折 $1,530
- 語言: 英文
- 頁數: 448
- 裝訂: Paperback
- ISBN: 0735710635
- ISBN-13: 9780735710634
-
相關分類:
Penetration-test
已過版
買這商品的人也買了...
-
C++ Primer, 3/e 中文版$980$774 -
$825Cisco CCNA Exam #640-607 Certification Guide, 3/e -
鳥哥的 Linux 私房菜$560$476 -
Sun Certified Programmer & Developer for Java 2 Study Guide, 2/e$1,830$1,739 -
C++ Builder 6 完全攻略$690$587 -
PHP & MySQL 完全架站攻略第二版$620$527 -
Java 完美經典優質學習篇$750$638 -
JSP 網站開發實務 (Web Development with Java Server Pages, 2/e)$650$553 -
JDBC 資料庫程式設計$580$493 -
Dreamweaver MX 互動網站百寶箱 for ASP$580$493 -
ASP.NET 程式設計徹底研究$590$466 -
Borland 傳奇$280$221 -
STRUTS 實作手冊(Struts in Action: Building Web Applications with the Leading Java Framework)$690$538 -
深入淺出 JBuilder 程式設計實作(JBuilder 9.0/8.0/7.0 適用) (Charlie Calvert's Learn Jbuilder)$720$562 -
Linux 9.X 指令參考手冊$650$553 -
重構─改善既有程式的設計$720$569 -
Practical Java Programming Language Guide 中文版 (Practical Java Programming Language Guide)$560$442 -
管理資訊系統─管理數位化公司 (Management Information Systems: Managing the Digital Firm, 8/e)$800$760 -
鳥哥的 Linux 私房菜-伺服器架設篇$750$638 -
鳥哥的 Linux 私房菜─基礎學習篇增訂版$560$476 -
Malware: Fighting Malicious Code (Paperback)$2,050$1,948 -
CCNA Self-Study: Interconnecting Cisco Network Devices (ICND) 640-811, 640-801, 2/e$2,260$2,147 -
Fundamentals of Database Systems, 4/e (IE)$1,090$1,068 -
人月神話:軟體專案管理之道 (20 週年紀念版)(The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition, 2/e)$480$379 -
ASP.NET 2.0 深度剖析範例集$650$507
相關主題
商品描述
Intrusion Signatures and Analysis opens with an introduction into the format of some of the more common sensors and then begins a tutorial into the unique format of the signatures and analyses used in the book. After a challenging four-chapter review, the reader finds page after page of signatures, in order by categories. Then the content digs right into reaction and responses covering how sometimes what you see isnt always what is happening. The book also covers how analysts can spend time chasing after false positives. Also included is a section on how attacks have shut down the networks and web sites of Yahoo, and E-bay and what those attacks looked like. Readers will also find review questions with answers throughout the book, to be sure they comprehend the traces and material that has been covered.
商品描述(中文翻譯)
《入侵簽名與分析》一書首先介紹了一些較常見的感測器格式,接著開始進入本書所使用的簽名和分析的獨特格式的教學。在經過四章具有挑戰性的回顧後,讀者將會看到一頁又一頁按類別排列的簽名。然後,內容深入探討反應和回應,說明有時候你所看到的並不總是實際發生的情況。本書還涵蓋了分析師如何花時間追逐假陽性(false positives)。此外,還包括了一個部分,講述攻擊如何使 Yahoo 和 E-bay 的網絡和網站癱瘓,以及這些攻擊的具體情況。讀者還會在全書中找到帶有答案的複習問題,以確保他們理解所涵蓋的痕跡和材料。
