Home
»
Practice of Network Security Monitoring
Practice of Network Security Monitoring
Regular price
€66.99
604 verified reviews
100% verified
Delivery/Collection within 10-20 working days
Shipping & Delivery
Shipping & Delivery
Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock
10-20 Working Days: On Backorder
Will Deliver When Available: On Pre-Order or Reprinting
We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!
Close
A01=Richard Bejtlich
Age Group_Uncategorized
Age Group_Uncategorized
Author_Richard Bejtlich
automatic-update
bugs
business
Category1=Non-Fiction
Category=UTN
cloud computing
computer
computer books
computer networking
computer networks
computer science
computer security
computers
computing
COP=United States
cryptography
cyber
cyber security
cyber security books
cybersecurity
dark web
data
Delivery_Pre-order
engineering
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
hackers
hacking
hacking books
internet
Language_English
languages
law
legal
linux
mba
network
network security
networking
octopus
PA=Temporarily unavailable
penetration test
penetration testing
Price_€50 to €100
privacy
programming
project management
PS=Active
radiation
script
security
softlaunch
spy
tech
technology
true crime
work
Product details
- ISBN 9781593275099
- Dimensions: 178 x 234mm
- Publication Date: 15 Jul 2013
- Publisher: No Starch Press,US
- Publication City/Country: US
- Product Form: Paperback
- Language: English
Network security is not simply about building impenetrable walls determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. You'll learn how to: Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There s no foolproof way to keep attackers out of your network. But when they get in, you ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
Richard Bejtlich is Chief Security Strategist at FireEye, and was formerly Chief Security Officer at Mandiant. He also served as Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). He is a graduate of Harvard University and the United States Air Force Academy. His previous works include The Tao of Network Security Monitoring, Extrusion Detection, and Real Digital Forensics (all from Addison-Wesley). He blogs (http://taosecurity.blogspot.com/) and writes on Twitter as @taosecurity.
Practice of Network Security Monitoring
€66.99
