|Titre :||Network intrusion detection : an analyst's handbook|
|Auteurs :||Stephen Northcutt, Auteur ; Judy Novak, Auteur|
|Type de document :||texte imprimé|
|Mention d'édition :||2e éd|
|Editeur :||Indiana : New riders, 2001|
|Format :||1 vol. (XXXII-430 p.) / 23 cm|
|Index. décimale :||004 (Informatique, traitement des données)|
|Mots-clés:||Détection(réseau) Entrée en ligne|
This book is a typical New Riders production, well done, detailed, written for folks who know (or would like to know) what they are doing by folks who do know what they are doing. It is not a large print, full of white space, over hyped book. It is a well crafted journey through protocols, diagrams, dumps, logs, forensics and how to be gentle with victims who receive your assistance.
There is a large and growing number of security related books available today. Many of these tell you practical information, such as how to use Secure SHell (SSH) instead of telnet and ftp because it will encrypt traffic. This is one helpful item is a large array of helpful items that will help secure your site. Unfortunately, this is not enough, because nothing will replace expertise. If you are going to spend significant time securing your site, you will need to understand what happens under the hood. While I like practical books, I really like books that explain the important details in a cohesive manner, so that I can learn to cope with the unexpected, new situation. If all you learn is the superficial level, you will be unable to handle the situation that does not come listed in that book. If you have a grasp of how the pieces work together, the new situation will have recognizable parts which you you will be able to join together so that it makes sense. My recommendation is to read and use the practical books, but also read the theory books and read books that explain the details, especially if they are done as well as Northcutt's book.
The twenty-two chapters cover topics like filters, signatures, protocol manipulation, attacks, responses to attacks and lots of software tools. The tools discussed are of the commercial and free variety for both attack and defense. There are two chapters describing particular attacks, Mitnik and Timex, each of which provide interesting stories and important lessons.
The scope of the book reaches to often ignored issues that are critical to dealing with security problems in general. Taking the technical path to protect your systems or networks can lead you past the big picture approach of looking at architecture and organization. It also generally bypasses the business problem, as well. These three ideas are related in that one must be able to integrate the structure of the organization and the configuration of nets, subnets and systems that ought to reflect that organization. How these are arranged makes a great difference in how difficult it will be to protect them. It makes a difference in determining whether traffic patterns within the enterprise are a problem or not. Above all of this are the managers who may or may not fund your attempts to protect the enterprise. Northcutt deals effectively with these issues.
|Côte titre :||S8/55967-55968|