Cargando…

The practice of network security monitoring : understanding incident detection and response /

Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bejtlich, Richard
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco : No Starch Press, [2013]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn864141303
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 131126s2013 cau ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d TEFOD  |d YDXCP  |d OCLCF  |d TEFOD  |d COO  |d EBLCP  |d B24X7  |d STF  |d E7B  |d OCLCQ  |d TEFOD  |d CNNOR  |d AGLDB  |d MOR  |d PIFPO  |d ZCU  |d LIV  |d RECBK  |d MERUC  |d OCLCQ  |d JBG  |d OCLCQ  |d U3W  |d TEFOD  |d YDX  |d ICG  |d INT  |d VT2  |d REC  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d OCLCQ  |d UKAHL  |d OCLCQ  |d BRF  |d OCLCQ  |d AZK  |d CNNLC  |d CRU  |d VLY  |d OCLCQ  |d OCLCO  |d INARC  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 865331904  |a 961632428  |a 1058164611  |a 1156098812 
020 |a 9781593275341  |q (electronic bk.) 
020 |a 159327534X  |q (electronic bk.) 
020 |a 9781593275099  |q (electronic bk.) 
020 |a 1593275099  |q (electronic bk.) 
029 1 |a AU@  |b 000052907408 
029 1 |a AU@  |b 000053295794 
029 1 |a AU@  |b 000053337509 
029 1 |a AU@  |b 000067095690 
029 1 |a DEBBG  |b BV043038357 
029 1 |a DEBBG  |b BV044065183 
029 1 |a DEBSZ  |b 424584360 
029 1 |a GBVCP  |b 80025192X 
029 1 |a NZ1  |b 15499653 
029 1 |a AU@  |b 000054145875 
035 |a (OCoLC)864141303  |z (OCoLC)865331904  |z (OCoLC)961632428  |z (OCoLC)1058164611  |z (OCoLC)1156098812 
037 |a 8D890DCA-0F91-4953-ACC5-20FB4958B064  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 62260A7E-53D6-4F4C-AD29-D2362323999C  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59  |b .B436 2013eb 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
049 |a UAMI 
100 1 |a Bejtlich, Richard. 
245 1 4 |a The practice of network security monitoring :  |b understanding incident detection and response /  |c by Richard Bejtlich. 
264 1 |a San Francisco :  |b No Starch Press,  |c [2013] 
300 |a 1 online resource (xxx, 341 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Foreword / by Todd Heberlein -- Preface -- Part I. Getting Started -- The Rationale -- Collecting Traffic -- Part II. Security Onion Deployment -- Standalone Deployment -- Distributed Deployment -- Housekeeping -- Part III. Tools -- Command Line Packet Analysis Tools -- Graphical Packet Analysis Tools -- Consoles -- Part III. NSM in Action -- Collection, Analysis, Escalation, and Resolution -- Server-Side Compromise -- Client-Side Compromise -- Extending SO -- Proxies and Checksums -- Conclusion -- Appendix A: Security Onion Scripts and Configuration / by Doug Burks. 
588 0 |a Print version record. 
520 |a Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks - no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Electronic countermeasures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Contre-mesures électroniques. 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Electronic countermeasures  |2 fast 
650 7 |a IT-säkerhet.  |2 sao 
758 |i has work:  |a The practice of network security monitoring (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGvVKkTrHMGvG3VYJqfdDC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Bejtlich, Richard.  |t Practice of network security monitoring  |z 9781593275099  |w (DLC) 2013017966  |w (OCoLC)843811405 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1572876  |z Texto completo 
938 |a Internet Archive  |b INAR  |n practiceofnetwor0000bejt 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33086832 
938 |a Books 24x7  |b B247  |n bks00058348 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6096636 
938 |a ebrary  |b EBRY  |n ebr10782565 
938 |a EBSCOhost  |b EBSC  |n 667549 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00709970 
938 |a YBP Library Services  |b YANK  |n 11382090 
994 |a 92  |b IZTAP