Applied network security monitoring collection, detection and analysis
This book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examples
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress is an imprint of Elsevier
© 2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 100809 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025559.0 | ||
| 008 | 221104 2014 maua bi 000 0 eng d | ||
| 020 | |a 9780124172081 | ||
| 039 | 9 | |a 202211041126 |b VLOAD |c 201411200846 |d faezah |c 201411171602 |d faezah |c 201411171601 |d faezah |y 201410132036 |z syarifuddin | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a TK 5105.59 |b S26 2014 | ||
| 100 | 1 | |a Sanders, Chris |e author | |
| 245 | 1 | 0 | |a Applied network security monitoring |b collection, detection and analysis |c Chris Sanders, Jason Smith |
| 264 | 1 | |a Waltham, MA |b Syngress is an imprint of Elsevier |c © 2014 | |
| 300 | |a xxiv, 472 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a 1. The practice of applied network security monitoring -- 2. Planning data collection -- 3. The sensor platform -- 4. Session data -- 5. Full packet capture data -- 6. Packet string data -- 7. Detection mechanisms, indicators of compromise, and signatures -- 8. Reputation-based detection -- 9. Signature-based detection with Snort and Suricata -- 10. The Bro platform -- 11. Anomaly-based detection with statistical data -- 12. Using canary honeypots for detection -- 13. Packet analysis -- 14. Friendly and threat intelligence -- 15. The analysis process | |
| 520 | |a This book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examples | ||
| 592 | |a 00013726 |b 03/11/2014 |c RM 199.80 |h PVK | ||
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Open source intelligence | |
| 701 | 1 | |a Smith, Jason |e author | |
| 999 | |a vtls000052953 |c 100809 |d 100809 | ||


