Linux Central cd-roms Commercial Linux distributions and software Linux books Linux games! Serial display modules Cool Linux gear!
Linux Central home page
--- Product Finder: ---

processor platform:
Product catalog
Linux Central CD-ROMs
Commercial Linux Distributions
Linux Applications and Software
Linux Books
Technical Books
Serial Display Modules
Bootable Network Cards
Linux Gear
Training and Certification
Shipping & Handling Options
About Linux Central
Contact us
Link us

Managed Linux Servers

[view your shopping cart]
 / root / Linux Books / Security
product shot
Intrusion Detection
in stock
ships in:
24 hrs.
release date:
December 2003
list price:
our price:
you save:
status: current
Author(s): Gene Schultz, Carl Endorf, Jim M
language: English
pages: 386
ISBN: 0072229543
related links
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Security Systems Black ICE & RealSecure, Cisco Systems Secure IDS, Computer Associates’ eTrust, Entercept, and the open source Snort tool.
product description

Carl Endorf,(Normal, IL) MS, CISSP, SSCP, MCSE, CCNA, ITIL, CIWA, GSEC, IAM is a technical security analyst for one of the largest Insurance and banking companies in the U.S. He has practical experience in intrusion attack detection, as an incident manager, forensics, corporate investigations and Internet security. Carl has written two certification study guides and has written many articles for Information Security Bulletin.

Eugene Schultz, Ph.D., CISSP (Livermore, CA) is a Principal Engineer with Lawrence Berkeley National Laboratory and also teaches computer science courses at the University of California at Berkeley. He is the author/co-author of multiple security titles for New Riders and O’Reilly. Gene is the Editor-in-Chief of Computers and Security, and was the Editor-in-Chief of Information Security Bulletin from 2000 through 2001.

Jim Mellander (El Sobrante, CA)

Is the developer of innovative peer-to-peer control software called Kazaa Obliterator, which prevents unauthorized peer-to-peer use at LBNL. He also taught classes at community colleges, user groups and conferences on the topics of Intrusion Detection/Incident Response, UNIX vulnerabilities, Linux firewalls, and TCP/UDP basics for Network Security, and is a SANS Instructor who teaches a course on UPDATE

related links
manufacturer website
Osborne/McGraw Hill

  product contents
back to top