Intrusion prevention and active response :: deploying network and host IPS /
Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure i...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. :
Syngress Pub.,
©2005.
©2005 |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 DE-862 DE-863 |
Zusammenfassung: | Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercia |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xx, 402 pages) : illustrations |
ISBN: | 1597490342 9781597490344 9780080489292 008048929X 1281035882 9781281035882 9786611035884 6611035885 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm70744890 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 050523s2005 maua o 001 0 eng d | ||
040 | |a REDDC |b eng |e pn |c REDDC |d BAKER |d OCLCQ |d NTG |d WPG |d EBLCP |d YDXCP |d OCLCQ |d MERUC |d CCO |d E7B |d IDEBK |d U5D |d OCLCQ |d MHW |d OCLCQ |d N$T |d OCLCQ |d ITD |d OCLCF |d DKDLA |d OCLCQ |d OCLCO |d OPELS |d OKU |d FVL |d B24X7 |d NLGGC |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d AU@ |d UMI |d OCLCQ |d COO |d OCLCO |d KSU |d AZK |d LOA |d DEBBG |d AGLDB |d ZCU |d LIV |d OCLCQ |d U3W |d OCLCA |d STF |d BRL |d WRM |d D6H |d VTS |d CEF |d NRAMU |d EZ9 |d ICG |d OCLCQ |d INT |d VT2 |d OCLCQ |d A6Q |d OCLCQ |d LEAUB |d DKC |d OCLCQ |d VLY |d UKCRE |d OCLCO |d OCLCQ |d COA |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 61356801 |a 123117076 |a 162599127 |a 181421110 |a 474867145 |a 476018449 |a 559806760 |a 606028316 |a 646731128 |a 722350110 |a 728026639 |a 765142525 |a 780975981 |a 792914369 |a 856961185 |a 933930879 |a 961549548 |a 962564774 |a 966200072 |a 988539438 |a 1035704591 |a 1037483944 |a 1038637286 |a 1045509727 |a 1047529627 |a 1055383047 |a 1076293230 |a 1081219021 |a 1153051629 |a 1162017927 |a 1228605496 |a 1340058046 | ||
020 | |a 1597490342 |q (electronic bk.) | ||
020 | |a 9781597490344 |q (electronic bk.) | ||
020 | |a 9780080489292 |q (electronic bk.) | ||
020 | |a 008048929X |q (electronic bk.) | ||
020 | |a 1281035882 | ||
020 | |a 9781281035882 | ||
020 | |a 9786611035884 | ||
020 | |a 6611035885 | ||
020 | |z 193226647X | ||
020 | |z 9781932266474 | ||
024 | 8 | |a (WaSeSS)ssj0000280954 | |
035 | |a (OCoLC)70744890 |z (OCoLC)61356801 |z (OCoLC)123117076 |z (OCoLC)162599127 |z (OCoLC)181421110 |z (OCoLC)474867145 |z (OCoLC)476018449 |z (OCoLC)559806760 |z (OCoLC)606028316 |z (OCoLC)646731128 |z (OCoLC)722350110 |z (OCoLC)728026639 |z (OCoLC)765142525 |z (OCoLC)780975981 |z (OCoLC)792914369 |z (OCoLC)856961185 |z (OCoLC)933930879 |z (OCoLC)961549548 |z (OCoLC)962564774 |z (OCoLC)966200072 |z (OCoLC)988539438 |z (OCoLC)1035704591 |z (OCoLC)1037483944 |z (OCoLC)1038637286 |z (OCoLC)1045509727 |z (OCoLC)1047529627 |z (OCoLC)1055383047 |z (OCoLC)1076293230 |z (OCoLC)1081219021 |z (OCoLC)1153051629 |z (OCoLC)1162017927 |z (OCoLC)1228605496 |z (OCoLC)1340058046 | ||
050 | 4 | |a QA76.9.A25 |b I368 2005eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Intrusion prevention and active response : |b deploying network and host IPS / |c Michael Rash [and others] ; technical reviewer, Anne Henmi. |
260 | |a Rockland, Mass. : |b Syngress Pub., |c ©2005. | ||
264 | 4 | |c ©2005 | |
300 | |a 1 online resource (xx, 402 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Contents; Foreword; Intrusion Prevention and Active Response; Packet Inspection for Intrusion Analysis; False Positives and Real Damage; Four Layers of IPS Actions; Network Inline Data Modification; Protecting Your Host Through the Operating System; IPS at the Application Layer; Deploying Open Source IPS Solutions; IPS Evasion Techniques (Network); Index; Related Titles. | |
520 | |a Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercia | ||
546 | |a English. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer networks |x Access control. |0 http://id.loc.gov/authorities/subjects/sh2007008424 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Access control |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Rash, Michael. |4 aut |1 https://id.oclc.org/worldcat/entity/E39PCjHFwMh9wcK3FXDDCHrFDq |0 http://id.loc.gov/authorities/names/n2006062544 | |
700 | 1 | |a Henmi, Anne. |4 rev |1 https://id.oclc.org/worldcat/entity/E39PCjHdgMWxmVhKWTj4QPbFjC |0 http://id.loc.gov/authorities/names/no2008023978 | |
758 | |i has work: |a Intrusion prevention and active response (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGRVVDxPbt3DqRPTtt6Frq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Intrusion prevention and active response. |d Rockland, Mass. : Syngress Pub., ©2005 |z 9781932266474 |w (OCoLC)57355446 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781932266474 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781932266474 |3 Volltext |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249361 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249361 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Books 24x7 |b B247 |n bks00004530 | ||
938 | |a Baker & Taylor |b BKTY |c 49.95 |d 37.46 |i 193226647X |n 0006215166 |s active | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL226578 | ||
938 | |a ebrary |b EBRY |n ebr10077322 | ||
938 | |a EBSCOhost |b EBSC |n 249361 | ||
938 | |a YBP Library Services |b YANK |n 2730622 | ||
938 | |a YBP Library Services |b YANK |n 2627183 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm70744890 |
---|---|
_version_ | 1829094602557095936 |
adam_text | |
any_adam_object | |
author | Rash, Michael |
author2 | Henmi, Anne |
author2_role | rev |
author2_variant | a h ah |
author_GND | http://id.loc.gov/authorities/names/n2006062544 http://id.loc.gov/authorities/names/no2008023978 |
author_facet | Rash, Michael Henmi, Anne |
author_role | aut |
author_sort | Rash, Michael |
author_variant | m r mr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 I368 2005eb |
callnumber-search | QA76.9.A25 I368 2005eb |
callnumber-sort | QA 276.9 A25 I368 42005EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Contents; Foreword; Intrusion Prevention and Active Response; Packet Inspection for Intrusion Analysis; False Positives and Real Damage; Four Layers of IPS Actions; Network Inline Data Modification; Protecting Your Host Through the Operating System; IPS at the Application Layer; Deploying Open Source IPS Solutions; IPS Evasion Techniques (Network); Index; Related Titles. |
ctrlnum | (OCoLC)70744890 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05816cam a2200817 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm70744890 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">050523s2005 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">REDDC</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">REDDC</subfield><subfield code="d">BAKER</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NTG</subfield><subfield code="d">WPG</subfield><subfield code="d">EBLCP</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">U5D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ITD</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">FVL</subfield><subfield code="d">B24X7</subfield><subfield code="d">NLGGC</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AU@</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">KSU</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">DEBBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ZCU</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">EZ9</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLY</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">61356801</subfield><subfield code="a">123117076</subfield><subfield code="a">162599127</subfield><subfield code="a">181421110</subfield><subfield code="a">474867145</subfield><subfield code="a">476018449</subfield><subfield code="a">559806760</subfield><subfield code="a">606028316</subfield><subfield code="a">646731128</subfield><subfield code="a">722350110</subfield><subfield code="a">728026639</subfield><subfield code="a">765142525</subfield><subfield code="a">780975981</subfield><subfield code="a">792914369</subfield><subfield code="a">856961185</subfield><subfield code="a">933930879</subfield><subfield code="a">961549548</subfield><subfield code="a">962564774</subfield><subfield code="a">966200072</subfield><subfield code="a">988539438</subfield><subfield code="a">1035704591</subfield><subfield code="a">1037483944</subfield><subfield code="a">1038637286</subfield><subfield code="a">1045509727</subfield><subfield code="a">1047529627</subfield><subfield code="a">1055383047</subfield><subfield code="a">1076293230</subfield><subfield code="a">1081219021</subfield><subfield code="a">1153051629</subfield><subfield code="a">1162017927</subfield><subfield code="a">1228605496</subfield><subfield code="a">1340058046</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490342</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490344</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489292</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008048929X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035882</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035882</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611035884</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611035885</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">193226647X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781932266474</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">(WaSeSS)ssj0000280954</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70744890</subfield><subfield code="z">(OCoLC)61356801</subfield><subfield code="z">(OCoLC)123117076</subfield><subfield code="z">(OCoLC)162599127</subfield><subfield code="z">(OCoLC)181421110</subfield><subfield code="z">(OCoLC)474867145</subfield><subfield code="z">(OCoLC)476018449</subfield><subfield code="z">(OCoLC)559806760</subfield><subfield code="z">(OCoLC)606028316</subfield><subfield code="z">(OCoLC)646731128</subfield><subfield code="z">(OCoLC)722350110</subfield><subfield code="z">(OCoLC)728026639</subfield><subfield code="z">(OCoLC)765142525</subfield><subfield code="z">(OCoLC)780975981</subfield><subfield code="z">(OCoLC)792914369</subfield><subfield code="z">(OCoLC)856961185</subfield><subfield code="z">(OCoLC)933930879</subfield><subfield code="z">(OCoLC)961549548</subfield><subfield code="z">(OCoLC)962564774</subfield><subfield code="z">(OCoLC)966200072</subfield><subfield code="z">(OCoLC)988539438</subfield><subfield code="z">(OCoLC)1035704591</subfield><subfield code="z">(OCoLC)1037483944</subfield><subfield code="z">(OCoLC)1038637286</subfield><subfield code="z">(OCoLC)1045509727</subfield><subfield code="z">(OCoLC)1047529627</subfield><subfield code="z">(OCoLC)1055383047</subfield><subfield code="z">(OCoLC)1076293230</subfield><subfield code="z">(OCoLC)1081219021</subfield><subfield code="z">(OCoLC)1153051629</subfield><subfield code="z">(OCoLC)1162017927</subfield><subfield code="z">(OCoLC)1228605496</subfield><subfield code="z">(OCoLC)1340058046</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">I368 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Intrusion prevention and active response :</subfield><subfield code="b">deploying network and host IPS /</subfield><subfield code="c">Michael Rash [and others] ; technical reviewer, Anne Henmi.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, Mass. :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 402 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Contents; Foreword; Intrusion Prevention and Active Response; Packet Inspection for Intrusion Analysis; False Positives and Real Damage; Four Layers of IPS Actions; Network Inline Data Modification; Protecting Your Host Through the Operating System; IPS at the Application Layer; Deploying Open Source IPS Solutions; IPS Evasion Techniques (Network); Index; Related Titles.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercia</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2007008424</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rash, Michael.</subfield><subfield code="4">aut</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjHFwMh9wcK3FXDDCHrFDq</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2006062544</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Henmi, Anne.</subfield><subfield code="4">rev</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjHdgMWxmVhKWTj4QPbFjC</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008023978</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Intrusion prevention and active response (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGRVVDxPbt3DqRPTtt6Frq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Intrusion prevention and active response.</subfield><subfield code="d">Rockland, Mass. : Syngress Pub., ©2005</subfield><subfield code="z">9781932266474</subfield><subfield code="w">(OCoLC)57355446</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781932266474</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781932266474</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249361</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249361</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00004530</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker & Taylor</subfield><subfield code="b">BKTY</subfield><subfield code="c">49.95</subfield><subfield code="d">37.46</subfield><subfield code="i">193226647X</subfield><subfield code="n">0006215166</subfield><subfield code="s">active</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL226578</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10077322</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">249361</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730622</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627183</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm70744890 |
illustrated | Illustrated |
indexdate | 2025-04-11T08:35:44Z |
institution | BVB |
isbn | 1597490342 9781597490344 9780080489292 008048929X 1281035882 9781281035882 9786611035884 6611035885 |
language | English |
oclc_num | 70744890 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xx, 402 pages) : illustrations |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Intrusion prevention and active response : deploying network and host IPS / Michael Rash [and others] ; technical reviewer, Anne Henmi. Rockland, Mass. : Syngress Pub., ©2005. ©2005 1 online resource (xx, 402 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Includes index. Print version record. Cover; Contents; Foreword; Intrusion Prevention and Active Response; Packet Inspection for Intrusion Analysis; False Positives and Real Damage; Four Layers of IPS Actions; Network Inline Data Modification; Protecting Your Host Through the Operating System; IPS at the Application Layer; Deploying Open Source IPS Solutions; IPS Evasion Techniques (Network); Index; Related Titles. Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercia English. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Access control fast Computer networks Security measures fast Computer security fast Rash, Michael. aut https://id.oclc.org/worldcat/entity/E39PCjHFwMh9wcK3FXDDCHrFDq http://id.loc.gov/authorities/names/n2006062544 Henmi, Anne. rev https://id.oclc.org/worldcat/entity/E39PCjHdgMWxmVhKWTj4QPbFjC http://id.loc.gov/authorities/names/no2008023978 has work: Intrusion prevention and active response (Text) https://id.oclc.org/worldcat/entity/E39PCGRVVDxPbt3DqRPTtt6Frq https://id.oclc.org/worldcat/ontology/hasWork Print version: Intrusion prevention and active response. Rockland, Mass. : Syngress Pub., ©2005 9781932266474 (OCoLC)57355446 |
spellingShingle | Rash, Michael Intrusion prevention and active response : deploying network and host IPS / Cover; Contents; Foreword; Intrusion Prevention and Active Response; Packet Inspection for Intrusion Analysis; False Positives and Real Damage; Four Layers of IPS Actions; Network Inline Data Modification; Protecting Your Host Through the Operating System; IPS at the Application Layer; Deploying Open Source IPS Solutions; IPS Evasion Techniques (Network); Index; Related Titles. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Access control fast Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh2007008424 https://id.nlm.nih.gov/mesh/D016494 |
title | Intrusion prevention and active response : deploying network and host IPS / |
title_auth | Intrusion prevention and active response : deploying network and host IPS / |
title_exact_search | Intrusion prevention and active response : deploying network and host IPS / |
title_full | Intrusion prevention and active response : deploying network and host IPS / Michael Rash [and others] ; technical reviewer, Anne Henmi. |
title_fullStr | Intrusion prevention and active response : deploying network and host IPS / Michael Rash [and others] ; technical reviewer, Anne Henmi. |
title_full_unstemmed | Intrusion prevention and active response : deploying network and host IPS / Michael Rash [and others] ; technical reviewer, Anne Henmi. |
title_short | Intrusion prevention and active response : |
title_sort | intrusion prevention and active response deploying network and host ips |
title_sub | deploying network and host IPS / |
topic | Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Access control fast Computer networks Security measures fast Computer security fast |
topic_facet | Computer security. Computer networks Security measures. Computer networks Access control. Computer Security Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Access control Computer networks Security measures Computer security |
work_keys_str_mv | AT rashmichael intrusionpreventionandactiveresponsedeployingnetworkandhostips AT henmianne intrusionpreventionandactiveresponsedeployingnetworkandhostips |