9781593275099-1593275099-The Practice of Network Security Monitoring: Understanding Incident Detection and Response

The Practice of Network Security Monitoring: Understanding Incident Detection and Response

ISBN-13: 9781593275099
ISBN-10: 1593275099
Edition: 1
Author: Richard Bejtlich
Publication date: 2013
Publisher: No Starch Press
Format: Paperback 376 pages
FREE US shipping
Buy

From $13.11

Book details

ISBN-13: 9781593275099
ISBN-10: 1593275099
Edition: 1
Author: Richard Bejtlich
Publication date: 2013
Publisher: No Starch Press
Format: Paperback 376 pages

Summary

The Practice of Network Security Monitoring: Understanding Incident Detection and Response (ISBN-13: 9781593275099 and ISBN-10: 1593275099), written by authors Richard Bejtlich, was published by No Starch Press in 2013. With an overall rating of 4.1 stars, it's a notable title among other Networking & Cloud Computing (Network Security, Security & Encryption, Hacking) books. You can easily purchase or rent The Practice of Network Security Monitoring: Understanding Incident Detection and Response (Paperback, Used) from BooksRun, along with many other new and used Networking & Cloud Computing books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $2.05.

Description

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.

You'll learn how to:
–Determine where to deploy NSM platforms, and size them for the monitored networks
–Deploy stand-alone or distributed NSM installations
–Use command line and graphical packet analysis tools, and NSM consoles
–Interpret network evidence from server-side and client-side intrusions
–Integrate threat intelligence into NSM software to identify sophisticated adversaries

There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book