Limit search to available items
Book Cover
Book

Title Intrusion signatures and analysis / Stephen Northcutt ... [and others]
Edition First edition
Published Indianapolis, Ind. : New Riders, 2001

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Nor/Isa  AVAILABLE
Description xxi, 408 pages : illustrations ; 23 cm
Contents 1. Reading Log Files -- 2. Introduction to the Practicals -- 3. The Most Critical Internet Security Threats (Part 1) -- 4. The Most Critical Internet Security Threats (Part 2) -- 5. Non-Malicious Traffic -- 6. Perimeter Logs -- 7. Reactions and Responses -- 8. Network Mapping -- 9. Scans That Probe Systems for Information -- 10. Denial of Service - Resource Starvation -- 11. Denial of Service - Bandwidth Consumption -- 12. Trojans -- 13. Exploits -- 14. Buffer Overflows with Content -- 15. Fragmentation -- 16. False Positives -- 17. Out-of-Spec Packets
Bibliography Includes bibliographical references and index
Subject Computer security.
Computers -- Access control.
Author Northcutt, Stephen.
LC no. 00108786
ISBN 0735710635