The Practice of Network Security Monitoring

The Practice of Network Security Monitoring pdf epub mobi txt 電子書 下載2025

出版者:No Starch Press
作者:Richard Bejtlich
出品人:
頁數:376
译者:
出版時間:2013-8-5
價格:GBP 39.99
裝幀:Paperback
isbn號碼:9781593275099
叢書系列:
圖書標籤:
  • hack
  • 網絡安全監控
  • 網絡安全
  • 安全分析
  • 流量分析
  • 入侵檢測
  • 威脅情報
  • 日誌分析
  • 安全運維
  • 實踐指南
  • 網絡取證
想要找書就要到 小美書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

具體描述

Network Security Monitoring (NSM) is the the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. The Practice of Network Security Monitoring teaches IT and security staff how to leverage powerful NSM tools and concepts to identify threats quickly and effectively. Author Richard Bejtlich is a recognized expert in NSM and shares his 15 years of incident handling experience with the reader. In addition to teaching you how to use key monitoring tools, Bejtlich demonstrates a holistic way of thinking about detecting, responding to, and containing intruders. The Practice of Network Security Monitoring assumes no prior experience with network security monitoring, and covers designing, deploying, building, and running an NSM operation. The book focuses on open source software and vendor-neutral tools, avoiding costly and inflexible solutions.

著者簡介

Richard Bejtlich is Chief Security Officer at Mandiant and was previously Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). He is a graduate of Harvard University and the United States Air Force Academy. Bejtlich’s previous works include The Tao of Network Security Monitoring, Extrusion Detection, and Real Digital Forensics (all from Addison-Wesley). He writes on his blog (taosecurity.blogspot.com) and on Twitter as @taosecurity

圖書目錄

Foreward by Todd Heberlein
Preface (Download PDF)
Part I: Getting Started
Chapter 1: Network Security Monitoring Rationale
Chapter 2: Collecting Network Traffic: Access, Storage, and Management
Part II: Security Onion Deployment
Chapter 3: Stand-alone NSM Deployment and Installation
Chapter 4: Distributed Deployment
Chapter 5: SO Platform Housekeeping
Part III: Tools
Chapter 6: Command Line Packet Analysis Tools
Chapter 7: Graphical Packet Analysis Tools
Chapter 8: NSM Consoles
Part IV: NSM in Action
Chapter 9: NSM Operations
Chapter 10: Server-side Compromise
Chapter 11: Client-side Compromise
Chapter 12: Extending SO
Chapter 13: Proxies and Checksums
Conclusion
Appendix
SO Scripts and Configuration
Index
· · · · · · (收起)

讀後感

評分

評分

評分

評分

評分

用戶評價

评分

security onion 工具書,但網絡安全監控分析思路講的比較簡略,分彆講瞭兩個實例,服務端攻擊和客戶端攻擊,將工具集的使用串起來。

评分

security onion 工具書,但網絡安全監控分析思路講的比較簡略,分彆講瞭兩個實例,服務端攻擊和客戶端攻擊,將工具集的使用串起來。

评分

security onion 工具書,但網絡安全監控分析思路講的比較簡略,分彆講瞭兩個實例,服務端攻擊和客戶端攻擊,將工具集的使用串起來。

评分

security onion 工具書,但網絡安全監控分析思路講的比較簡略,分彆講瞭兩個實例,服務端攻擊和客戶端攻擊,將工具集的使用串起來。

评分

security onion 工具書,但網絡安全監控分析思路講的比較簡略,分彆講瞭兩個實例,服務端攻擊和客戶端攻擊,將工具集的使用串起來。

本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美書屋 版权所有