skip to content
The Tao of network security monitoring : beyond intrusion detection Preview this item
ClosePreview this item
Checking...

The Tao of network security monitoring : beyond intrusion detection

Author: Richard Bejtlich
Publisher: Boston : Addison-Wesley, ©2005.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:

Suitable for beginners, this book provides you with the knowledge you need to defend your network from attackers - both the obvious and the not so obvious. It also offers the basics of TCP/IP  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
(DLC) 2004007857
(OCoLC)54931565
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Richard Bejtlich
ISBN: 9780321246776 0321246772
OCLC Number: 58600423
Notes: Includes index.
Description: 1 online resource (xxxiv, 798 pages) : illustrations
Contents: Ch. 1. security process --
Ch. 2. What is network security monitoring? --
Ch. 3. Deployment considerations --
Ch. 4. reference intrusion model --
Ch. 5. Full content data --
Ch. 6. Additional data analysis --
Ch. 7. Session data --
Ch. 8. Statistical data --
Ch. 9. Alert data : Bro and Prelude --
Ch. 10. Alert data : NSM using Sguil --
Ch. 11. Best practices --
Ch. 12. Case studies for managers --
Ch. 13. Analyst training program --
Ch. 14. Discovering DNS --
Ch. 15. Harnessing the power of session data --
Ch. 16. Packet monkey heaven --
Ch. 17. Tools for attacking network security monitoring --
Ch. 18. Tactics for attacking network security monitoring --
Epilogue : the future of network security monitoring --
App. A. Protocol header reference --
App. B. Intellectual history of network security monitoring --
App. C. Protocol anomaly detection.
Responsibility: Richard Bejtlich.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/58600423> # The Tao of network security monitoring : beyond intrusion detection
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "58600423" ;
    library:placeOfPublication <http://dbpedia.org/resource/Boston> ; # Boston
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2005" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/1004544#Person/bejtlich_richard> ; # Richard Bejtlich
    schema:datePublished "2005" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1004544> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/54931565> ;
    schema:name "The Tao of network security monitoring : beyond intrusion detection"@en ;
    schema:productID "58600423" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/58600423#PublicationEvent/boston_addison_wesley_2005> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1004544#Agent/addison_wesley> ; # Addison-Wesley
    schema:url <http://proquest.safaribooksonline.com/0321246772> ;
    schema:workExample <http://worldcat.org/isbn/9780321246776> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/58600423> ;
    .


Related Entities

<http://dbpedia.org/resource/Boston> # Boston
    a schema:Place ;
    schema:name "Boston" ;
    .

<http://experiment.worldcat.org/entity/work/data/1004544#Agent/addison_wesley> # Addison-Wesley
    a bgn:Agent ;
    schema:name "Addison-Wesley" ;
    .

<http://experiment.worldcat.org/entity/work/data/1004544#Person/bejtlich_richard> # Richard Bejtlich
    a schema:Person ;
    schema:familyName "Bejtlich" ;
    schema:givenName "Richard" ;
    schema:name "Richard Bejtlich" ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://worldcat.org/isbn/9780321246776>
    a schema:ProductModel ;
    schema:isbn "0321246772" ;
    schema:isbn "9780321246776" ;
    .

<http://www.worldcat.org/oclc/54931565>
    a schema:CreativeWork ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/58600423> ; # The Tao of network security monitoring : beyond intrusion detection
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.