CDN$ 41.37
  • List Price: CDN$ 65.99
  • You Save: CDN$ 24.62 (37%)
Usually ships within 3 to 5 weeks.
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Add to Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network Paperback – Dec 11 2002


Amazon Price New from Used from
Paperback
"Please retry"
CDN$ 41.37
CDN$ 28.07 CDN$ 11.15

Join Amazon Student in Canada


NO_CONTENT_IN_FEATURE

Product Details

  • Paperback: 336 pages
  • Publisher: Wiley; 1 edition (Dec 11 2002)
  • Language: English
  • ISBN-10: 0764549499
  • ISBN-13: 978-0764549496
  • Product Dimensions: 23 x 19 x 2 cm
  • Shipping Weight: 699 g
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Bestsellers Rank: #2,688,651 in Books (See Top 100 in Books)
  • See Complete Table of Contents


Inside This Book (Learn More)
First Sentence
WELCOME TO THE WORLD of intrusion detection. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4.5 out of 5 stars
5 star
1
4 star
1
3 star
0
2 star
0
1 star
0
See both customer reviews
Share your thoughts with other customers

Most helpful customer reviews

Format: Paperback
This book takes a simplistical approach to understanding IDS systems. I enjoyed the book and really got a grasp on IDS. I've touched basis with IDS before but was able to completely and thouroughly comprehend the main points of the book because of the great technial expertise and writing syle of the book.
Great for security admins!
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
When was the last time you saw a new book on detecting intrusions at your local book store? Aside from revisions of "Network Intrusion Detection" by Northcutt and Novak, the last thought-provoking book was Paul Proctor's "Practical Intrusion Detection Handbook," published in August 2000. In 2003, IDS fans, the drought has ended.
"Implementing Intrusion Detection Systems" (IIDS) is a welcome start to a year that will see four books published with the word "Snort" in their titles. IIDS pays homage to the finest detection engine in the land, but uses Snort as a sample of the capabilities an IDS has to offer -- capabilities frequently attacked in the press and by assessment-oriented companies. Author Tim Crothers tackles the naysayers head-on in the book's second paragraph: "You see media articles from well-known security writers claiming that IDS is a dead technology. Fortunately, those writers are wrong." Amen!
IIDS is clear and straightforward, with a dose of good advice and informative diagrams. The sample IDS deployment chapter was nice to see in a published work, and the evasion section in chapter 5 was well done. Overall Wiley did a fine job editing IIDS and the price is reasonable.

Now for the toughest part of any review -- constructive criticism of technical details. Crothers' discussion of "passive ftp" on p. 39 doesn't recognize that port 20 is only involved in "active ftp". (See pp. 456-7 of "Building Internet Firewalls, 2nd Ed, for a chart to silence all debate on this topic.) Closed tcp ports reply with RST ACKs, not the lone RSTs listed on p. 96. The author doesn't mention that FIN scans (p.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 4 reviews
5 of 5 people found the following review helpful
A welcome start to the 2003 IDS book publishing rush Jan. 8 2003
By Richard Bejtlich - Published on Amazon.com
Format: Paperback
When was the last time you saw a new book on detecting intrusions at your local book store? Aside from revisions of "Network Intrusion Detection" by Northcutt and Novak, the last thought-provoking book was Paul Proctor's "Practical Intrusion Detection Handbook," published in August 2000. In 2003, IDS fans, the drought has ended.
"Implementing Intrusion Detection Systems" (IIDS) is a welcome start to a year that will see four books published with the word "Snort" in their titles. IIDS pays homage to the finest detection engine in the land, but uses Snort as a sample of the capabilities an IDS has to offer -- capabilities frequently attacked in the press and by assessment-oriented companies. Author Tim Crothers tackles the naysayers head-on in the book's second paragraph: "You see media articles from well-known security writers claiming that IDS is a dead technology. Fortunately, those writers are wrong." Amen!
IIDS is clear and straightforward, with a dose of good advice and informative diagrams. The sample IDS deployment chapter was nice to see in a published work, and the evasion section in chapter 5 was well done. Overall Wiley did a fine job editing IIDS and the price is reasonable.

Now for the toughest part of any review -- constructive criticism of technical details. Crothers' discussion of "passive ftp" on p. 39 doesn't recognize that port 20 is only involved in "active ftp". (See pp. 456-7 of "Building Internet Firewalls, 2nd Ed, for a chart to silence all debate on this topic.) Closed tcp ports reply with RST ACKs, not the lone RSTs listed on p. 96. The author doesn't mention that FIN scans (p. 97) are never used because the lack of a response could be easily due to firewalls dropping packets, not open ports staying quiet.
And, repeating the mistake seen in almost every book mentioning TCP/IP, Crothers' Appendix A claims TCPDump displays "starting and ending relative sequence numbers" (p. 258). Rather, those numbers are the sequence number of the first byte of data in the segment and the sequence number of the first byte of data in the NEXT segment. That's why a TCP segment with 432 bytes of data shows 1:433 in TCPDump -- the first byte is "relative" number 1, the last is relative number 432, and the NEXT is 433.

Apart from my philosophical disagreements with the author's detection methodology and priorities, I enjoyed reading IIDS immensely. I finished it in less than two days and highlighted many lines of text. It will be fun to see how the other four IDS books arriving this year compare to Tim Crothers' work.
perfect June 6 2014
By Mesguerra - Published on Amazon.com
Format: Paperback Verified Purchase
the best book of IDS with snort, best practices and best tips of network analysis of detection intrusion in the company
Excellent introduction to IDS Nov. 27 2005
By Amazon Customer - Published on Amazon.com
Format: Paperback
Implementing Intrusion Detection Systems by Tim Crothers is an excellent introduction to the topics important to implementing any IDS. Crothers uses Snort as a reference IDS system, but the coverage of Snort is not intended to be comprehensive so if you plan to use Snort you will need an additional resource. Crothers does an excellent job of giving a very basic overview of underlying protocol elements that need to be understood to be a competent IDS manager without going into excessive detail for the generalist. Overall this is an excellent introduction to IDS topics. For someone with IDS experience this book will probably be useful in filling in some holes in your knowledge but Network Intrusion Detection by Nortcut and Novak may be a better book for the experienced IDS implementer.
Excellent book Feb. 20 2003
By Jonathan Bushnell - Published on Amazon.com
Format: Paperback
This book takes a simplistical approach to understanding IDS systems. I enjoyed the book and really got a grasp on IDS. I've touched basis with IDS before but was able to completely and thouroughly comprehend the main points of the book because of the great technial expertise and writing syle of the book.
Great for security admins!

Product Images from Customers

Search


Feedback