Intrusion prevention and active response: deploying network and host IPS
Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure i...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress Pub.
© 2005
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercia |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource (xx, 402 pages) illustrations |
ISBN: | 1597490342 9781597490344 9780080489292 008048929X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124563 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2005 |||| o||u| ||||||eng d | ||
020 | |a 1597490342 |9 1-59749-034-2 | ||
020 | |a 9781597490344 |9 978-1-59749-034-4 | ||
020 | |a 9780080489292 |9 978-0-08-048929-2 | ||
020 | |a 008048929X |9 0-08-048929-X | ||
035 | |a (ZDB-33-ESD)ocm70744890 | ||
035 | |a (OCoLC)70744890 | ||
035 | |a (DE-599)BVBBV046124563 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Intrusion prevention and active response |b deploying network and host IPS |c Michael Rash [and others] ; technical reviewer, Anne Henmi |
264 | 1 | |a Rockland, Mass. |b Syngress Pub. |c © 2005 | |
264 | 4 | |c © 2005 | |
300 | |a 1 online resource (xx, 402 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercia | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Access control |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Access control | |
700 | 1 | |a Rash, Michael |e Sonstige |4 oth | |
700 | 1 | |a Henmi, Anne |4 rev | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 193226647X |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781932266474 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781932266474 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505017 | ||
347 | |a data file |2 rda | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781932266474 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442724696064 |
---|---|
any_adam_object | |
author2 | Henmi, Anne |
author2_role | rev |
author2_variant | a h ah |
author_facet | Henmi, Anne |
building | Verbundindex |
bvnumber | BV046124563 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm70744890 (OCoLC)70744890 (DE-599)BVBBV046124563 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02608nmm a2200529zc 4500</leader><controlfield tag="001">BV046124563</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490342</subfield><subfield code="9">1-59749-034-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490344</subfield><subfield code="9">978-1-59749-034-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489292</subfield><subfield code="9">978-0-08-048929-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008048929X</subfield><subfield code="9">0-08-048929-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm70744890</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70744890</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124563</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intrusion prevention and active response</subfield><subfield code="b">deploying network and host IPS</subfield><subfield code="c">Michael Rash [and others] ; technical reviewer, Anne Henmi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2005</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 402 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercia</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rash, Michael</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Henmi, Anne</subfield><subfield code="4">rev</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">193226647X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781932266474</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781932266474</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505017</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781932266474</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124563 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 1597490342 9781597490344 9780080489292 008048929X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505017 |
oclc_num | 70744890 |
open_access_boolean | |
physical | 1 online resource (xx, 402 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Intrusion prevention and active response deploying network and host IPS Michael Rash [and others] ; technical reviewer, Anne Henmi Rockland, Mass. Syngress Pub. © 2005 © 2005 1 online resource (xx, 402 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercia COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Computer networks Access control Rash, Michael Sonstige oth Henmi, Anne rev Erscheint auch als Druck-Ausgabe 193226647X Erscheint auch als Druck-Ausgabe 9781932266474 http://www.sciencedirect.com/science/book/9781932266474 Verlag URL des Erstveröffentlichers Volltext data file rda |
spellingShingle | Intrusion prevention and active response deploying network and host IPS COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Computer networks Access control |
title | Intrusion prevention and active response deploying network and host IPS |
title_auth | Intrusion prevention and active response deploying network and host IPS |
title_exact_search | Intrusion prevention and active response deploying network and host IPS |
title_full | Intrusion prevention and active response deploying network and host IPS Michael Rash [and others] ; technical reviewer, Anne Henmi |
title_fullStr | Intrusion prevention and active response deploying network and host IPS Michael Rash [and others] ; technical reviewer, Anne Henmi |
title_full_unstemmed | Intrusion prevention and active response deploying network and host IPS Michael Rash [and others] ; technical reviewer, Anne Henmi |
title_short | Intrusion prevention and active response |
title_sort | intrusion prevention and active response deploying network and host ips |
title_sub | deploying network and host IPS |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Computer networks Access control |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Access control Computer networks / Security measures Computer security Computer networks Security measures Computer networks Access control |
url | http://www.sciencedirect.com/science/book/9781932266474 |
work_keys_str_mv | AT rashmichael intrusionpreventionandactiveresponsedeployingnetworkandhostips AT henmianne intrusionpreventionandactiveresponsedeployingnetworkandhostips |