CHAPTER 27
INTRUSION DETECTION AND INTRUSION PREVENTION DEVICES
Rebecca Gurley Bace
27.1 SECURITY BEHIND THE FIREWALL
27.1.1 What Is Intrusion Detection?
27.1.2 What Is Intrusion Prevention?
27.1.3 Where Do Intrusion Detection and Intrusion Prevention Fit in Security Management?
27.1.4 Brief History of Intrusion Detection
27.2.3 Intrusion Detection Architecture
27.3.1 Intrusion Prevention System Architecture
27.3.2 Intrusion Prevention Analysis Strategy
27.4.2 Operating System Monitoring
27.4.4 Other Types of Monitoring
27.4.5 Issues in Information Sources
27.6.2 Active Responses: Man-in-the-Loop and Autonomous
27.6.3 Automated Response Goals
27.7 NEEDS ASSESSMENT AND PRODUCT SELECTION
27.7.1 Matching Needs to Features
27.7.3 Integrating IDS Products with Your Security Infrastructure
27.7.4 Deployment of IDS Products
27.1 SECURITY BEHIND THE FIREWALL.
Even today, when asked how they would go about securing a computer or computer network, most people mention firewalls, ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.