The Practice of Network Security Monitoring

Understanding Incident Detection and Response

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Practice of Network Security Monitoring by Richard Bejtlich, No Starch Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Richard Bejtlich ISBN: 9781593275341
Publisher: No Starch Press Publication: July 15, 2013
Imprint: No Starch Press Language: English
Author: Richard Bejtlich
ISBN: 9781593275341
Publisher: No Starch Press
Publication: July 15, 2013
Imprint: No Starch Press
Language: English

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.

You'll learn how to:
–Determine where to deploy NSM platforms, and size them for the monitored networks
–Deploy stand-alone or distributed NSM installations
–Use command line and graphical packet analysis tools, and NSM consoles
–Interpret network evidence from server-side and client-side intrusions
–Integrate threat intelligence into NSM software to identify sophisticated adversaries

There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.

You'll learn how to:
–Determine where to deploy NSM platforms, and size them for the monitored networks
–Deploy stand-alone or distributed NSM installations
–Use command line and graphical packet analysis tools, and NSM consoles
–Interpret network evidence from server-side and client-side intrusions
–Integrate threat intelligence into NSM software to identify sophisticated adversaries

There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

More books from No Starch Press

Cover of the book If Hemingway Wrote JavaScript by Richard Bejtlich
Cover of the book Scratch Programming Playground by Richard Bejtlich
Cover of the book Beautiful LEGO by Richard Bejtlich
Cover of the book The LEGO Architecture Idea Book by Richard Bejtlich
Cover of the book Micro:bit for Mad Scientists by Richard Bejtlich
Cover of the book The LEGO Christmas Ornaments Book by Richard Bejtlich
Cover of the book The LEGO Adventure Book, Vol. 3 by Richard Bejtlich
Cover of the book The Artist's Guide to GIMP, 2nd Edition by Richard Bejtlich
Cover of the book Snip, Burn, Solder, Shred by Richard Bejtlich
Cover of the book Incredible LEGO Technic by Richard Bejtlich
Cover of the book The LEGO Adventure Book, Vol. 1 by Richard Bejtlich
Cover of the book Linux Basics for Hackers by Richard Bejtlich
Cover of the book Python Playground by Richard Bejtlich
Cover of the book Ruby by Example by Richard Bejtlich
Cover of the book Automate the Boring Stuff with Python by Richard Bejtlich
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy