9780124172081-0124172083-Applied Network Security Monitoring: Collection, Detection, and Analysis

Applied Network Security Monitoring: Collection, Detection, and Analysis

ISBN-13: 9780124172081
ISBN-10: 0124172083
Edition: 1
Author: Chris Sanders, Jason Smith
Publication date: 2013
Publisher: Syngress
Format: Paperback 496 pages
FREE US shipping
Rent
35 days
from $45.70 USD
FREE shipping on RENTAL RETURNS
Buy

From $58.48

Rent

From $45.70

Book details

ISBN-13: 9780124172081
ISBN-10: 0124172083
Edition: 1
Author: Chris Sanders, Jason Smith
Publication date: 2013
Publisher: Syngress
Format: Paperback 496 pages

Summary

Applied Network Security Monitoring: Collection, Detection, and Analysis (ISBN-13: 9780124172081 and ISBN-10: 0124172083), written by authors Chris Sanders, Jason Smith, was published by Syngress in 2013. With an overall rating of 4.0 stars, it's a notable title among other Networking & Cloud Computing (Network Security, Security & Encryption) books. You can easily purchase or rent Applied Network Security Monitoring: Collection, Detection, and Analysis (Paperback) from BooksRun, along with many other new and used Networking & Cloud Computing books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $5.67.

Description

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach, complete with real-world examples that teach you the key concepts of NSM.

Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster.

The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical knowledge that you can apply immediately.

  • Discusses the proper methods for planning and executing an NSM data collection strategy
  • Provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, PRADS, and more
  • The first book to define multiple analysis frameworks that can be used for performing NSM investigations in a structured and systematic manner
  • Loaded with practical examples that make use of the Security Onion Linux distribution
  • Companion website includes up-to-date blogs from the authors about the latest developments in NSM, complete with supplementary book materials
If you've never performed NSM analysis, Applied Network Security Monitoring will help you grasp the core concepts needed to become an effective analyst. If you are already working in an analysis role, this book will allow you to refine your analytic technique and increase your effectiveness.

You will get caught off guard, you will be blind sided, and sometimes you will lose the fight to prevent attackers from accessing your network. This book is about equipping you with the right tools for collecting the data you need, detecting malicious activity, and performing the analysis that will help you understand the nature of an intrusion. Although prevention can eventually fail, NSM doesn't have to.
** Note: All author royalties from the sale of Applied NSM are being donated to a number of charities selected by the authors.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book