The practice of network security monitoring : understanding incident detection and response /
Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to in...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
San Francisco :
No Starch Press,
[2013]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Foreword / by Todd Heberlein
- Preface
- Part I. Getting Started
- The Rationale
- Collecting Traffic
- Part II. Security Onion Deployment
- Standalone Deployment
- Distributed Deployment
- Housekeeping
- Part III. Tools
- Command Line Packet Analysis Tools
- Graphical Packet Analysis Tools
- Consoles
- Part III. NSM in Action
- Collection, Analysis, Escalation, and Resolution
- Server-Side Compromise
- Client-Side Compromise
- Extending SO
- Proxies and Checksums
- Conclusion
- Appendix A: Security Onion Scripts and Configuration / by Doug Burks.