|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_ocn864141303 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
131126s2013 cau ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d TEFOD
|d YDXCP
|d OCLCF
|d TEFOD
|d COO
|d EBLCP
|d B24X7
|d STF
|d E7B
|d OCLCQ
|d TEFOD
|d CNNOR
|d AGLDB
|d MOR
|d PIFPO
|d ZCU
|d LIV
|d RECBK
|d MERUC
|d OCLCQ
|d JBG
|d OCLCQ
|d U3W
|d TEFOD
|d YDX
|d ICG
|d INT
|d VT2
|d REC
|d OCLCQ
|d WYU
|d G3B
|d TKN
|d OCLCQ
|d DKC
|d OCLCQ
|d UKAHL
|d OCLCQ
|d BRF
|d OCLCQ
|d AZK
|d CNNLC
|d CRU
|d VLY
|d OCLCQ
|d OCLCO
|d INARC
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 865331904
|a 961632428
|a 1058164611
|a 1156098812
|
020 |
|
|
|a 9781593275341
|q (electronic bk.)
|
020 |
|
|
|a 159327534X
|q (electronic bk.)
|
020 |
|
|
|a 9781593275099
|q (electronic bk.)
|
020 |
|
|
|a 1593275099
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000052907408
|
029 |
1 |
|
|a AU@
|b 000053295794
|
029 |
1 |
|
|a AU@
|b 000053337509
|
029 |
1 |
|
|a AU@
|b 000067095690
|
029 |
1 |
|
|a DEBBG
|b BV043038357
|
029 |
1 |
|
|a DEBBG
|b BV044065183
|
029 |
1 |
|
|a DEBSZ
|b 424584360
|
029 |
1 |
|
|a GBVCP
|b 80025192X
|
029 |
1 |
|
|a NZ1
|b 15499653
|
029 |
1 |
|
|a AU@
|b 000054145875
|
035 |
|
|
|a (OCoLC)864141303
|z (OCoLC)865331904
|z (OCoLC)961632428
|z (OCoLC)1058164611
|z (OCoLC)1156098812
|
037 |
|
|
|a 8D890DCA-0F91-4953-ACC5-20FB4958B064
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 62260A7E-53D6-4F4C-AD29-D2362323999C
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|b .B436 2013eb
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bejtlich, Richard.
|
245 |
1 |
4 |
|a The practice of network security monitoring :
|b understanding incident detection and response /
|c by Richard Bejtlich.
|
264 |
|
1 |
|a San Francisco :
|b No Starch Press,
|c [2013]
|
300 |
|
|
|a 1 online resource (xxx, 341 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Foreword / by Todd Heberlein -- Preface -- Part I. Getting Started -- The Rationale -- Collecting Traffic -- Part II. Security Onion Deployment -- Standalone Deployment -- Distributed Deployment -- Housekeeping -- Part III. Tools -- Command Line Packet Analysis Tools -- Graphical Packet Analysis Tools -- Consoles -- Part III. NSM in Action -- Collection, Analysis, Escalation, and Resolution -- Server-Side Compromise -- Client-Side Compromise -- Extending SO -- Proxies and Checksums -- Conclusion -- Appendix A: Security Onion Scripts and Configuration / by Doug Burks.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks - no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Electronic countermeasures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Contre-mesures électroniques.
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Electronic countermeasures
|2 fast
|
650 |
|
7 |
|a IT-säkerhet.
|2 sao
|
758 |
|
|
|i has work:
|a The practice of network security monitoring (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGvVKkTrHMGvG3VYJqfdDC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Bejtlich, Richard.
|t Practice of network security monitoring
|z 9781593275099
|w (DLC) 2013017966
|w (OCoLC)843811405
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1572876
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n practiceofnetwor0000bejt
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33086832
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00058348
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6096636
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10782565
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 667549
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00709970
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11382090
|
994 |
|
|
|a 92
|b IZTAP
|