,

Applied Network Security Monitoring

Collection, Detection, and Analysis

Specificaties
Paperback, 496 blz. | Engels
Elsevier Science | e druk, 2014
ISBN13: 9780124172081
Rubricering
Hoofdrubriek : Computer en informatica
Elsevier Science e druk, 2014 9780124172081
Verwachte levertijd ongeveer 16 werkdagen

Samenvatting

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.
Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster.
The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data.
If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.

-Discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst
-Provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, and Argus
-Loaded with practical examples containing real PCAP files you can replay, and uses Security Onion for all its lab examples
-Companion website includes up-to-date blogs from the authors about the latest developments in NSM

Specificaties

ISBN13:9780124172081
Taal:Engels
Bindwijze:paperback
Aantal pagina's:496
Verschijningsdatum:20-1-2014

Over Jason Smith

Jason McC. Smith received his Ph.D. in Computer Science in 2005 from the University of North Carolina at Chapel Hill, where the Elemental Design Patterns were born as part of the System for Pattern Query and Recognition (SPQR) project. He then spent four years at IBM Watson Research with the opportunity to apply the lessons of SPQR and the EDP catalog and compositional approach to immense bodies of software, both legacy and modern. Dr. Smith is currently Senior Research Scientist at The Software Revolution, Inc. in Kirkland, WA, where he continues to refine the EDP catalog and look for ways to enhance the company's goal of automated modernization and transformation of legacy systems.

Andere boeken door Jason Smith

Inhoudsopgave

-Introduction to NSM
-Driving Data Collection
-The Sensor Platform
-Full Packet Capture Data
-Session Data
-Protocol Metadata
-Statistical Data
-Indicators of Compromise
-Target-Based Detection
-Signature-Based Detection with Snort
-Signature-Based Detection with Suricata
-Anomaly-Based Detection with Bro
-Early Warning AS&W with Honeypots
-Packet Analysis
-Friendly Intelligence
-Hostile Intelligence
-Differential Diagnosis of NSM Events
-Incident Morbidity and Mortality
-Malware Analysis for NSM

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Applied Network Security Monitoring