Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20
Wij wijzen u graag op het volgende
Door drukte zijn de levertijden van PostNL aangepast en kan uw pakket vertraging oplopen. Door de Brexit kan de levering van Engelse boeken vertraging oplopen.

Applied Network Security Monitoring

Collection, Detection, and Analysis

Paperback Engels 2014 9780124172081
Verkooppositie 4807
Verwachte levertijd ongeveer 15 werkdagen


Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.
Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster.
The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data.
If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.

-Discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst
-Provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, and Argus
-Loaded with practical examples containing real PCAP files you can replay, and uses Security Onion for all its lab examples
-Companion website includes up-to-date blogs from the authors about the latest developments in NSM


Aantal pagina's:496
Hoofdrubriek:IT-management / ICT


Wees de eerste die een lezersrecensie schrijft!

Geef uw waardering

Zeer goed Goed Voldoende Matig Slecht

Over Jason Smith

Jason McC. Smith received his Ph.D. in Computer Science in 2005 from the University of North Carolina at Chapel Hill, where the Elemental Design Patterns were born as part of the System for Pattern Query and Recognition (SPQR) project. He then spent four years at IBM Watson Research with the opportunity to apply the lessons of SPQR and the EDP catalog and compositional approach to immense bodies of software, both legacy and modern. Dr. Smith is currently Senior Research Scientist at The Software Revolution, Inc. in Kirkland, WA, where he continues to refine the EDP catalog and look for ways to enhance the company's goal of automated modernization and transformation of legacy systems.

Andere boeken door Jason Smith


-Introduction to NSM
-Driving Data Collection
-The Sensor Platform
-Full Packet Capture Data
-Session Data
-Protocol Metadata
-Statistical Data
-Indicators of Compromise
-Target-Based Detection
-Signature-Based Detection with Snort
-Signature-Based Detection with Suricata
-Anomaly-Based Detection with Bro
-Early Warning AS&W with Honeypots
-Packet Analysis
-Friendly Intelligence
-Hostile Intelligence
-Differential Diagnosis of NSM Events
-Incident Morbidity and Mortality
-Malware Analysis for NSM

Alle 100 bestsellers


Populaire producten



        Applied Network Security Monitoring