The Practice of Network Security Monitoring

Understanding Incident Detection and Response

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Practice of Network Security Monitoring by Richard Bejtlich, No Starch Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Richard Bejtlich ISBN: 9781593275341
Publisher: No Starch Press Publication: July 15, 2013
Imprint: No Starch Press Language: English
Author: Richard Bejtlich
ISBN: 9781593275341
Publisher: No Starch Press
Publication: July 15, 2013
Imprint: No Starch Press
Language: English

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.

You'll learn how to:
–Determine where to deploy NSM platforms, and size them for the monitored networks
–Deploy stand-alone or distributed NSM installations
–Use command line and graphical packet analysis tools, and NSM consoles
–Interpret network evidence from server-side and client-side intrusions
–Integrate threat intelligence into NSM software to identify sophisticated adversaries

There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.

You'll learn how to:
–Determine where to deploy NSM platforms, and size them for the monitored networks
–Deploy stand-alone or distributed NSM installations
–Use command line and graphical packet analysis tools, and NSM consoles
–Interpret network evidence from server-side and client-side intrusions
–Integrate threat intelligence into NSM software to identify sophisticated adversaries

There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

More books from No Starch Press

Cover of the book The Book of Ruby by Richard Bejtlich
Cover of the book The LEGO BOOST Activity Book by Richard Bejtlich
Cover of the book Growing Software by Richard Bejtlich
Cover of the book Arduino Project Handbook, Volume 2 by Richard Bejtlich
Cover of the book Hacking VoIP by Richard Bejtlich
Cover of the book Arduino Workshop by Richard Bejtlich
Cover of the book Gray Hat Python by Richard Bejtlich
Cover of the book The Hardware Hacker by Richard Bejtlich
Cover of the book The Smart Girl's Guide to Privacy by Richard Bejtlich
Cover of the book The LEGO Castle Book by Richard Bejtlich
Cover of the book The LEGO Adventure Book, Vol. 3 by Richard Bejtlich
Cover of the book Arduino Playground by Richard Bejtlich
Cover of the book Think Like a Programmer by Richard Bejtlich
Cover of the book The Manga Guide to Electricity by Richard Bejtlich
Cover of the book How Linux Works by Richard Bejtlich
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy