Extrusion Detection : Security Monitoring for Internal Intrusions (Paperback)

Customer Reviews   Write a Review

Be the first to review this item and earn 25 Rakuten Super Points™

Product Overview

Former Air Force intelligence officer Richard Bejtlich is founder of TaoSecurity, a company that helps clients detect, contain, and remediate intrusions using network security monitoring principles. He specializes in network-centric incident response and forensics.


Publisher Pearson P T R
Mfg Part# 9780321349965
SKU 31296125
Format Paperback
ISBN10 0321349962
Release Date 4/10/2007
Dimensions (in Inches) 9H x 6.75L x 1T
From the Publisher
Editors Note Overcome Your Fastest-Growing Security Problem: Internal, Client-Based AttacksToday's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software. Hardening your network perimeter won't solve this problem. You must systematically protect client software and monitor the traffic it generates.Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument networks to detect anomalies in outgoing traffic, architect networks to resist internal attacks, and respond effectively when attacks occur.Bejtlich's The Tao of Network Security Monitoring earned acclaim as the definitive guide to overcoming external threats. Now, in Extrusion Detection, he brings the same level of insight to defending against today's rapidly emerging internal threats. Whether you're an architect, analyst, engineer, administrator, or IT manager, you face a new generation of security risks. Get this book and protect yourself.Coverage includesArchitecting defensible networks with pervasive awareness: theory, techniques, and tools Defending against malicious sites, Internet Explorer exploitations, bots, Trojans, worms, and moreDissecting session and full-content data to reveal unauthorized activityImplementing effective Layer 3 network access controlResponding to internal attacks, including step-by-step network forensics Assessing your network's current ability to resist internal attacksSetting reasonable corporate access policiesDetailed case studies, including the discovery of internal and IRC-based bot netsAdvanced extrusion detection: from data collection to host and vulnerability enumeration About the Web Site Get book updates and network security news at Richard Bejtlich's popular blog, taosecurity.blogspot.com, and his Web site, www.bejtlich.net.
Product Attributes
Book Format Paperback
Number of Pages 0385
Publisher Addison-Wesley Professional

More Buying Options

Seller Infomation Price & Shipping  
Books2AnywhereUS $33.95 + free shipping
Condition: Brand New
In Stock
Brand new book!
Usually ships in 1 to 2 business days
Add to Cart
$41.08 + free shipping
Condition: Brand New
In Stock, 45 Day Returns

On Order
Add to Cart
$41.08 + free shipping
$54.99 You save $13.91 (25%)
Earn 42 ($0.42) Rakuten Super Points™
What are Rakuten Super Points™?
Get rewarded when you shop! Earn 1 point per dollar spent. That's like getting cash back on every purchase. Easy to see matured points in checkout. Use points just like cash.
Learn More
Format: Paperback
Condition: Brand New
More coming soon, order now. On Order
Please select an option to buy
Add to Cart

Sold By:  Buy.com