Publisher: New Riders, 2001, 408 pages
Keywords: IT Security
Security analysts are often responsible for the livelihood of a business. We all know that information is power. If you find yourself at a loss in determining what is happening to your network or if you often find yourself chasing false positives, help is here.
Finally, a reference that moves beyond the theories of intrusion detection on to a full analysis of an attack, along with traces to determine what happened and how. Intrusion Signatures and Analysis provides a 10-step walkthrough for every trace covered, which teaches you an intrusion analysis methodology. There is no other book on the market so focused on teaching pragmatic log analysis.
You cannot do intrusion analysis effectively without this book!
All the nitty gritty you ever wanted to know about network attacks (and some stuff you don't want to know). A good read if your into the practicalities of IT security implementation.