Hazem M. El-Bakry, Nikos Mastorakis, A real-time intrusion detection algorithm for network security, Proceedings of the 8th conference on Applied informatics. Intrusion Detection. Rebecca Gurley Bace. © |Sams Publishing | Available. Share this page. Intrusion Detection. View larger. “Intrusion Detection”, Rebecca Gurley Bace, , , U$/C $ %A Rebecca Gurley Bace %C W. rd Street, Indianapolis, IN
|Published (Last):||5 August 2013|
|PDF File Size:||20.29 Mb|
|ePub File Size:||2.70 Mb|
|Price:||Free* [*Free Regsitration Required]|
Intrusion Detection – Rebecca Gurley Bace – Google Books
Bace’s take on this topic and title provides a solid and comprehensive background for anyone pursuing the subject. Concentrating on a conceptual model the book is occasionally weak in regard to practical implementation, but more than makes up for this textual deficiency bacd a strong sense of historical background, developmental approaches, and references to specific implementations that the practitioner may research separately.
Chapter one presents a history of intrusion detection starting with system accounting, through audit systems, to the most recent research and experimental systems.
The definitions and concepts focus from broad security theory to specific intrusion detection principles and variants in chapter two.
In this section:
Intrusion detection requires analysis of system and other information, and chapter three describes the sources for this data. Chapter four may be somewhat disappointing to security managers in that the discussion of analysis is academic and possibly weak in tone, even though real systems are used as illustrations.
The review of possible responses, in chapter five, includes warnings against inappropriate overreactions. Chapter seven talks about technical issues that are still to be addressed. The organization of this chapter is a bit loose, with some sections, such as those on reliability and analysis, seeming to overlap material.
Real world challenges are the topic of chapter eight, along with examples rebecfa attacks and intrusion detection system IDS design considerations. This section seems to reprise much of the content of the vulnerabilities chapter.
Dealing with legal issues, evidence, and privacy in chapter nine it is nice to see some newer examples than the old “berferd” and “wiley hacker” standards. Chapter ten’s review of intrusion detection systems, and actions to take if penetrated, addresses the informed user. Security administrators and strategists, at the executive level, are presented with everything from the need for security goals to globalization in chapter eleven.
Designers get a few general guidelines in chapter twelve, along with comments from those who have been implementing exemplary systems.
Chapter thirteen is a realistic look at guroey developments in attacks and defence.
Of the other “Intrusion Detection” books, Terry Escamilla’s cf. RVW is simply not in the same league, being basically a promotional brochure.
RVWis likewise not as clever as it thinks it is. RVW is very close in both quality and usefulness, and possibly has gurey edge in practical terms, although his book is a bit narrower in focus.
Bace provides a comprehensive overview and conceptual background that will ensure this text becomes a basic security reference. intruaion