skip to content
The practice of network security monitoring : understanding incident detection and response Preview this item
ClosePreview this item
Checking...

The practice of network security monitoring : understanding incident detection and response

Author: Richard Bejtlich
Publisher: San Francisco : No Starch Press, [2013]
Edition/Format:   Print book : EnglishView all editions and formats
Database:WorldCat
Summary:
This title teaches IT and security staff how to leverage powerful network security monitoring tools and concepts to identify threats quickly and effectively.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Richard Bejtlich
ISBN: 9781593275099 1593275099
OCLC Number: 843811405
Description: xxx, 341 pages ; 24 cm
Contents: Foreword / by Todd Heberlein --
Preface --
Part I. Getting Started --
The Rationale --
Collecting Traffic --
Part II. Security Onion Deployment --
Standalone Deployment --
Distributed Deployment --
Housekeeping --
Part III. Tools --
Command Line Packet Analysis Tools --
Graphical Packet Analysis Tools --
Consoles --
Part III. NSM in Action --
Collection, Analysis, Escalation, and Resolution --
Server-Side Compromise --
Client-Side Compromise --
Extending SO --
Proxies and Checksums --
Conclusion --
Appendix A: Security Onion Scripts and Configuration / by Doug Burks.
Responsibility: by Richard Bejtlich.
More information:

Abstract:

This title teaches IT and security staff how to leverage powerful network security monitoring tools and concepts to identify threats quickly and effectively.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(3)

User lists with this item (2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/843811405> # The practice of network security monitoring : understanding incident detection and response
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "843811405" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/it_sakerhet> ; # IT-säkerhet
   schema:about <http://id.worldcat.org/fast/906940> ; # Electronic countermeasures
   schema:about <http://dewey.info/class/004.6/e23/> ;
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:bookFormat bgn:PrintBook ;
   schema:creator <http://viaf.org/viaf/163880229> ; # Richard Bejtlich
   schema:datePublished "2013" ;
   schema:description "This title teaches IT and security staff how to leverage powerful network security monitoring tools and concepts to identify threats quickly and effectively."@en ;
   schema:description "Foreword / by Todd Heberlein -- Preface -- Part I. Getting Started -- The Rationale -- Collecting Traffic -- Part II. Security Onion Deployment -- Standalone Deployment -- Distributed Deployment -- Housekeeping -- Part III. Tools -- Command Line Packet Analysis Tools -- Graphical Packet Analysis Tools -- Consoles -- Part III. NSM in Action -- Collection, Analysis, Escalation, and Resolution -- Server-Side Compromise -- Client-Side Compromise -- Extending SO -- Proxies and Checksums -- Conclusion -- Appendix A: Security Onion Scripts and Configuration / by Doug Burks."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/2994458995> ;
   schema:inLanguage "en" ;
   schema:name "The practice of network security monitoring : understanding incident detection and response"@en ;
   schema:productID "843811405" ;
   schema:url <http://catdir.loc.gov/catdir/enhancements/fy1313/2013017966-t.html> ;
   schema:workExample <http://worldcat.org/isbn/9781593275099> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB347565> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/843811405> ;
    .


Related Entities

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/906940> # Electronic countermeasures
    a schema:Intangible ;
   schema:name "Electronic countermeasures"@en ;
    .

<http://viaf.org/viaf/163880229> # Richard Bejtlich
    a schema:Person ;
   schema:familyName "Bejtlich" ;
   schema:givenName "Richard" ;
   schema:name "Richard Bejtlich" ;
    .

<http://worldcat.org/isbn/9781593275099>
    a schema:ProductModel ;
   schema:isbn "1593275099" ;
   schema:isbn "9781593275099" ;
    .

<http://www.worldcat.org/title/-/oclc/843811405>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/843811405> ; # The practice of network security monitoring : understanding incident detection and response
   schema:dateModified "2017-09-03" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.