Problem solve Get help with specific problems with your technologies, process and projects.

Guide to intrusion detection and prevention

This guide covers intrusion detection and prevention.


This guide was created in partnership between:

                         


It's no secret that a layered security structure is the key to protecting networks from pernicious intrusions. One of the major components in that structure is having solid intrusion detection and prevention. Created in partnership with our sister site, SearchSecurity.com, this guide is a compilation of resources that explain what intrusion detection and prevention are, how they work, troubleshooting, configurations and more. Send us an e-mail to let us know what other guides you would like to see on SearchNetworking.com.

TABLE OF CONTENTS

   Introduction to Intrusion Detection and Prevention
   IDS/IPS Architecture
   Wireless Intrusion Detection
   IDS/IPS Implementation and Placement
   Troubleshooting and False Positives
   Snort and Other Sniffers
   Product Reviews and Buying Advice
   The Future of Intrusion Detection and Prevention
   More Learning Resources

  Introduction to Intrusion Detection and Prevention  Return to Table of Contents

  IDS/IPS Architecture  Return to Table of Contents

  Wireless Intrusion Detection  Return to Table of Contents

  IDS/IPS Implementation and Placement  Return to Table of Contents

  Troubleshooting and False Positives  Return to Table of Contents

  Snort and Other Sniffers  Return to Table of Contents

  Product Reviews and Buying Advice  Return to Table of Contents

  The Future of Intrusion Detection and Prevention  Return to Table of Contents

  More Learning Resources  Return to Table of Contents
This was last published in December 2005

Dig Deeper on Network Security Best Practices and Products

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchITChannel

Close