Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

How This Book Is Organized
Icons Used in This Book
Defining Intrusion Prevention Systems
Passive Detection versus Inline Prevention
Passive Detection Inline Prevention
Network versus Host IPS
Common Detection Methodologies
False Positives
False Negatives
Open versus Closed Architectures
Worms, Trojans, and Buffer Overflows
Spyware, Phishing, and Botnets
SYN Floods and Denial of Service (DoS) Attacks
Zero-Day Attacks
Advanced Persistent Threats (APT)
Typical IPS versus Next- Generation IPS
Benefits and Risks of Virtualization
Securing Virtualization
Virtualizing Security
Securing the Cloud
U.S. Sarbanes-Oxley Act (SOX)
U.S. Gramm-Leach-Bliley Act (GLBA)
Basel II
SSAE16 and SAS70
Common IPS Selection Criteria
Industry-Specific Considerations
Hardware Considerations
Third-Party Testing
0 of .
Results for:
No results containing your search query
P. 1
Ips Dummies

Ips Dummies

Ratings: (0)|Views: 12|Likes:

More info:

Published by: Aarón-Stuart Linux-Luna on Jul 25, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 36 are not shown in this preview.
You're Reading a Free Preview
Pages 40 to 76 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->