Intrusion detection: network security beyond the firewall

BEFORE INTRUSION DETECTION: TRADITIONAL COMPUTER SECURITY. Intrusion Detection and the Classic Security Model. The Role of Identification and Authentication in Your Environment. The Role of Access Control in Your Environment. Traditional Network Security Approaches. INTRUSION DETECTION: BEYOND TRADITIONAL SECURITY. Intrusion Detection and Why You Need It. Detecting Intruders on Your System Is Fun and Easy. Vulnerability Scanners. UNIX System-Level IDSs. Sniffing for Intruders. Intrusion Detection for NT. ROUNDING OUT YOUR ENVIRONMENT. You've Been Hit!. Intrusion Detection: Not the Last Chapter When It Comes To Security. Appendix. References. Index.