* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective * Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS * Features coverage of the recently revised IETF IDS specification * Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling * Provides step-by-step instructions for configuration procedures
* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective * Packed with...