Applied network security monitoring collection, detection and analysis

This book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examples

Saved in:
Bibliographic Details
Main Author: Sanders, Chris (Author)
Format: Book
Language:English
Published: Waltham, MA Syngress is an imprint of Elsevier © 2014
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 100809
003 MY-KLNDU
005 20241220025559.0
008 221104 2014 maua bi 000 0 eng d
020 |a 9780124172081 
039 9 |a 202211041126  |b VLOAD  |c 201411200846  |d faezah  |c 201411171602  |d faezah  |c 201411171601  |d faezah  |y 201410132036  |z syarifuddin 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a TK 5105.59  |b S26 2014 
100 1 |a Sanders, Chris  |e author 
245 1 0 |a Applied network security monitoring  |b collection, detection and analysis  |c Chris Sanders, Jason Smith 
264 1 |a Waltham, MA  |b Syngress is an imprint of Elsevier  |c © 2014 
300 |a xxiv, 472 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
505 0 |a 1. The practice of applied network security monitoring -- 2. Planning data collection -- 3. The sensor platform -- 4. Session data -- 5. Full packet capture data -- 6. Packet string data -- 7. Detection mechanisms, indicators of compromise, and signatures -- 8. Reputation-based detection -- 9. Signature-based detection with Snort and Suricata -- 10. The Bro platform -- 11. Anomaly-based detection with statistical data -- 12. Using canary honeypots for detection -- 13. Packet analysis -- 14. Friendly and threat intelligence -- 15. The analysis process 
520 |a This book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examples 
592 |a 00013726  |b 03/11/2014  |c RM 199.80  |h PVK 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security 
650 0 |a Open source intelligence 
701 1 |a Smith, Jason  |e author 
999 |a vtls000052953  |c 100809  |d 100809