Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response

Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response

List Price: $49.95
Your Price: $49.95
Product Info Reviews

<< 1 >>

Rating: 3 stars
Summary: Useful as a college text, but not for front-line analysts
Review: I am responsible for a 50+ person intrusion detection mission, and I read this book in August 1999. Had I not read Stephen Northcutt's "Network Intrusion Detection," I may not have given Dr. Amoroso's work three stars. Unfortunately, by catering to a niche audience (probably graduate students), this book is not very helpful to folks under fire from malicious Internet users. Dr. Amoroso is very respected in the field, but I would have preferred less process charts and taxonomy descriptions. The publisher does a disservice by stating on the back cover "System administrators, programmers, system and software engineers, and managers of technology will find this book invaluable." Had the book been advertised as a college text, I would have been less critical. Sorry Dr. Amoroso -- I look forward to your next book, though!

Rating: 3 stars
Summary: Useful as a college text, but not for front-line analysts
Review: I am responsible for a 50+ person intrusion detection mission, and I read this book in August 1999. Had I not read Stephen Northcutt's "Network Intrusion Detection," I may not have given Dr. Amoroso's work three stars. Unfortunately, by catering to a niche audience (probably graduate students), this book is not very helpful to folks under fire from malicious Internet users. Dr. Amoroso is very respected in the field, but I would have preferred less process charts and taxonomy descriptions. The publisher does a disservice by stating on the back cover "System administrators, programmers, system and software engineers, and managers of technology will find this book invaluable." Had the book been advertised as a college text, I would have been less critical. Sorry Dr. Amoroso -- I look forward to your next book, though!

Rating: 2 stars
Summary: Not for practitioners
Review: I mistakenly bought this book on (what I thought) was the recommendation from a friend. Whoops. Amoroso's book is apparently aimed at students, not practitioners. The book I really should have bought was Steve Northcutt's Intrusion Detection Handbook, which is superior by a magnitude, at least if you're out in the real world doing real ID. Heck, even if you're still in the classroom, you should choose Northcutt's book over this one. It's the difference between theory and practice, and in the computer security field, theory is a blind alley.

Rating: 2 stars
Summary: Not for practitioners
Review: I mistakenly bought this book on (what I thought) was the recommendation from a friend. Whoops. Amoroso's book is apparently aimed at students, not practitioners. The book I really should have bought was Steve Northcutt's Intrusion Detection Handbook, which is superior by a magnitude, at least if you're out in the real world doing real ID. Heck, even if you're still in the classroom, you should choose Northcutt's book over this one. It's the difference between theory and practice, and in the computer security field, theory is a blind alley.

Rating: 4 stars
Summary: Good theoretical approach
Review: This book is not intended as a practitioner's handbook--that is what Northcutt's book is for. Amoroso's book is used as a text in his graduate classes.

If you want to understand the subject from a conceptual level, this book succeeds admirably. It is a bit dry, but acceptably so. Given that Amoroso has taught the subject several times, the organization is logical. The sources are extensive (although other academics who have performed research in this area complain that several important references are missing).

Don't expect to be able to build an intrusion detection system after reading this book, but if you want an in-depth understanding of the subject, you should probably read it.

Rating: 5 stars
Summary: Excellent Theoritical AND Practical Book
Review: To quote the author, the book contains "Lots of information and no quick fixes." And the book contains exactly that! Bravo!

The book is concise, relevant, and very well written. It provides excellent information without getting bogged down in minute theory or implementation details.

The book provides a solid but practical theoretical background to intrusion detection. It contains relevant real world examples. It does not contain a bunch of dated "quick fixes" for each type of intrusion problem. (If that is what you want, you need BUGTRAQ or CERT, not a book. By the time an intrusion schema fix hits the press, its solution is out of date!)

The book is full of good ideas that are practical and often readily implementable. If you have a hacker/cracker problem, I highly recommend you read this book! It will give you good insight into the types of weaknesses that are exploitable and the types of defenses that are appropriate. There is even a chapter on setting traps to catch hackers.

(Hackers and Crackers: Please do not read this book!)

Jon R. Kibler, Systems Architect, Advanced Systems Engineering Technology Inc.

Rating: 5 stars
Summary: Excellent Theoritical AND Practical Book
Review: To quote the author, the book contains "Lots of information and no quick fixes." And the book contains exactly that! Bravo!

The book is concise, relevant, and very well written. It provides excellent information without getting bogged down in minute theory or implementation details.

The book provides a solid but practical theoretical background to intrusion detection. It contains relevant real world examples. It does not contain a bunch of dated "quick fixes" for each type of intrusion problem. (If that is what you want, you need BUGTRAQ or CERT, not a book. By the time an intrusion schema fix hits the press, its solution is out of date!)

The book is full of good ideas that are practical and often readily implementable. If you have a hacker/cracker problem, I highly recommend you read this book! It will give you good insight into the types of weaknesses that are exploitable and the types of defenses that are appropriate. There is even a chapter on setting traps to catch hackers.

(Hackers and Crackers: Please do not read this book!)

Jon R. Kibler, Systems Architect, Advanced Systems Engineering Technology Inc.


<< 1 >>

© 2004, ReviewFocus or its affiliates