Cart
Free US shipping over $10
Proud to be B-Corp

The Practice Of Network Security Monitoring Richard Bejtlich

The Practice Of Network Security Monitoring By Richard Bejtlich

The Practice Of Network Security Monitoring by Richard Bejtlich


$8,77
Condition - Good
Only 2 left

Faster Shipping

Get this product faster from our US warehouse

The Practice Of Network Security Monitoring Summary

The Practice Of Network Security Monitoring by Richard Bejtlich

Network security is not simply about building impenetrable walls determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. You'll learn how to: Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence int

About Richard Bejtlich

Richard Bejtlich is Chief Security Strategist at FireEye, and was formerly Chief Security Officer at Mandiant. He also served as Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). He is a graduate of Harvard University and the United States Air Force Academy. His previous works include The Tao of Network Security Monitoring, Extrusion Detection, and Real Digital Forensics (all from Addison-Wesley). He blogs (http://taosecurity.blogspot.com/) and writes on Twitter as @taosecurity.

Table of Contents

DedicationForewordPrefaceGetting StartedChapter 1: Network Security Monitoring RationaleChapter 2: Collecting Network Traffic: Access, Storage, and ManagementSecurity Onion DeploymentChapter 3: Stand-alone NSM Deployment and InstallationChapter 4: Distributed DeploymentChapter 5: SO Platform HousekeepingToolsChapter 6: Command Line Packet Analysis ToolsChapter 7: Graphical Packet Analysis ToolsChapter 8: NSM ConsolesNSM in ActionChapter 9: NSM OperationsChapter 10: Server-side CompromiseChapter 11: Client-side CompromiseChapter 12: Extending SOChapter 13: Proxies and ChecksumsConclusionSO Scripts and ConfigurationColophonUpdates

Additional information

CIN1593275099G
9781593275099
1593275099
The Practice Of Network Security Monitoring by Richard Bejtlich
Used - Good
Paperback
No Starch Press,US
20130715
376
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - The Practice Of Network Security Monitoring