Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Intrusion prevention and active response : deploying network and host IPS
Rash M., Orebaugh A., Clark G., Pinkard B., Babbin J., Syngress Publishing, New York, NY, 2005. 424 pp. Type: Book (9781932266474)
Date Reviewed: Oct 17 2005

“Intrusion prevention” is one of the most popular security buzz phrases of the last few years. There has been a limited amount of literature published discussing the prevention side of intrusion detection, but this book makes a great contribution to the overall understanding of the underlying concepts and possibilities, as well as the limitations of intrusion prevention systems (IPS).

Though this book is excellent, it does have two limitations. First, it starts on a technical level that is inaccessible to everyone but security professionals (though many of these people will enjoy not having to read for the twentieth time about the basics of transmission control protocol/Internet protocol (TCP/IP) and networking). So, for all newcomers to the security field, I recommend starting with a different book. The second limitation is its focus on open source products and implementations. There is some material about Internet Information Services and other Windows-related topics, but if you are looking for information on how to protect your Windows machines on an operating system level, this is the wrong book to use.

The book has a really nice hands-on approach, and this is emphasized in every chapter. In addition, the theoretical explanations are very well done. The authors show the basics of intrusion detection, including the evolution to intrusion prevention and how this technique can be dangerous regarding false positives and active response. The authors also provide really nice explanations of host protection through the operating system, how to use IPS on the application layer, and how to deploy various open source solutions. Overall, I can highly recommend this book to all technical security professionals who are interested in a competent explanation of today’s open source IPS solutions and concepts, and who value a pragmatic approach.

Reviewer:  Andreas Tomek Review #: CR131873 (0608-0816)
Bookmark and Share
  Reviewer Selected
 
 
Unauthorized Access (K.6.5 ... )
 
 
Authentication (K.6.5 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (C.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Unauthorized Access": Date
Testing and evaluating computer intrusion detection systems
Durst R., Champion T., Witten B., Miller E., Spagnuolo L. Communications of the ACM 42(7): 53-61, 1999. Type: Article
Aug 1 1999
Honeypots: tracking hackers
Spitzner L., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. Type: Book (9780321108951)
Jan 2 2003
Web hacking: attacks and defense
McClure S., Shah S., Shah S., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  492, Type: Book (9780201761764)
Jul 25 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy