skip to content
The practice of network security monitoring : understanding incident detection and response Preview this item
ClosePreview this item
Checking...

The practice of network security monitoring : understanding incident detection and response

Author: Richard Bejtlich
Publisher: San Francisco : No Starch Press, [2013]
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Bejtlich, Richard.
Practice of network security monitoring
(DLC) 2013017966
(OCoLC)843811405
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Richard Bejtlich
ISBN: 9781593275341 159327534X 9781593275099 1593275099
OCLC Number: 864141303
Description: 1 online resource (xxx, 341 pages)
Contents: Foreword / by Todd Heberlein --
Preface --
Part I. Getting Started --
The Rationale --
Collecting Traffic --
Part II. Security Onion Deployment --
Standalone Deployment --
Distributed Deployment --
Housekeeping --
Part III. Tools --
Command Line Packet Analysis Tools --
Graphical Packet Analysis Tools --
Consoles --
Part III. NSM in Action --
Collection, Analysis, Escalation, and Resolution --
Server-Side Compromise --
Client-Side Compromise --
Extending SO --
Proxies and Checksums --
Conclusion --
Appendix A: Security Onion Scripts and Configuration / by Doug Burks.
Responsibility: by Richard Bejtlich.
More information:

Abstract:

Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks - no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/864141303> # The practice of network security monitoring : understanding incident detection and response
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "864141303" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/4952-1/{8D890DCA-0F91-4953-ACC5-20FB4958B064}Img100.jpg'" ;
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computer_networks_scalability> ; # Computer networks--Scalability
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_computer_science> ; # COMPUTERS--Computer Science
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_reference> ; # COMPUTERS--Reference
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_machine_theory> ; # COMPUTERS--Machine Theory
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/web_sites_security_measures> ; # Web sites--Security measures
    schema:about <http://dewey.info/class/004.6/e23/> ;
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_information_technology> ; # COMPUTERS--Information Technology
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_computer_literacy> ; # COMPUTERS--Computer Literacy
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_data_processing> ; # COMPUTERS--Data Processing
    schema:about <http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_hardware_general> ; # COMPUTERS--Hardware--General
    schema:about <http://id.worldcat.org/fast/906940> ; # Electronic countermeasures
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/2994458995#Person/bejtlich_richard> ; # Richard Bejtlich
    schema:datePublished "2013" ;
    schema:description "Foreword / by Todd Heberlein -- Preface -- Part I. Getting Started -- The Rationale -- Collecting Traffic -- Part II. Security Onion Deployment -- Standalone Deployment -- Distributed Deployment -- Housekeeping -- Part III. Tools -- Command Line Packet Analysis Tools -- Graphical Packet Analysis Tools -- Consoles -- Part III. NSM in Action -- Collection, Analysis, Escalation, and Resolution -- Server-Side Compromise -- Client-Side Compromise -- Extending SO -- Proxies and Checksums -- Conclusion -- Appendix A: Security Onion Scripts and Configuration / by Doug Burks."@en ;
    schema:description "Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks - no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2994458995> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/843811405> ;
    schema:name "The practice of network security monitoring : understanding incident detection and response"@en ;
    schema:productID "864141303" ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=58348> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=667549> ;
    schema:url <https://www.overdrive.com/search?q=8D890DCA-0F91-4953-ACC5-20FB4958B064> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1572876> ;
    schema:url <https://samples.overdrive.com/practice-of-network?.epub-sample.overdrive.com> ;
    schema:url "http://images.contentreserve.com/ImageType-100/4952-1/{8D890DCA-0F91-4953-ACC5-20FB4958B064}Img100.jpg" ;
    schema:url <http://catdir.loc.gov/catdir/enhancements/fy1313/2013017966-t.html> ;
    schema:url <http://site.ebrary.com/id/10782565> ;
    schema:workExample <http://worldcat.org/isbn/9781593275341> ;
    schema:workExample <http://worldcat.org/isbn/9781593275099> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/864141303> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2994458995#Person/bejtlich_richard> # Richard Bejtlich
    a schema:Person ;
    schema:familyName "Bejtlich" ;
    schema:givenName "Richard" ;
    schema:name "Richard Bejtlich" ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computer_networks_scalability> # Computer networks--Scalability
    a schema:Intangible ;
    schema:name "Computer networks--Scalability"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_computer_literacy> # COMPUTERS--Computer Literacy
    a schema:Intangible ;
    schema:name "COMPUTERS--Computer Literacy"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_computer_science> # COMPUTERS--Computer Science
    a schema:Intangible ;
    schema:name "COMPUTERS--Computer Science"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_data_processing> # COMPUTERS--Data Processing
    a schema:Intangible ;
    schema:name "COMPUTERS--Data Processing"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_hardware_general> # COMPUTERS--Hardware--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Hardware--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_information_technology> # COMPUTERS--Information Technology
    a schema:Intangible ;
    schema:name "COMPUTERS--Information Technology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_machine_theory> # COMPUTERS--Machine Theory
    a schema:Intangible ;
    schema:name "COMPUTERS--Machine Theory"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/computers_reference> # COMPUTERS--Reference
    a schema:Intangible ;
    schema:name "COMPUTERS--Reference"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2994458995#Topic/web_sites_security_measures> # Web sites--Security measures
    a schema:Intangible ;
    schema:name "Web sites--Security measures"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/906940> # Electronic countermeasures
    a schema:Intangible ;
    schema:name "Electronic countermeasures"@en ;
    .

<http://worldcat.org/isbn/9781593275099>
    a schema:ProductModel ;
    schema:isbn "1593275099" ;
    schema:isbn "9781593275099" ;
    .

<http://worldcat.org/isbn/9781593275341>
    a schema:ProductModel ;
    schema:isbn "159327534X" ;
    schema:isbn "9781593275341" ;
    .

<http://www.worldcat.org/oclc/843811405>
    a schema:CreativeWork ;
    rdfs:label "Practice of network security monitoring" ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/864141303> ; # The practice of network security monitoring : understanding incident detection and response
    .

<http://www.worldcat.org/title/-/oclc/864141303>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/864141303> ; # The practice of network security monitoring : understanding incident detection and response
    schema:dateModified "2016-07-14" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.