The Tao of Network Security Monitoring

Beyond Intrusion Detection

  • 0 Ratings
  • 0 Want to read
  • 1 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 1 Currently reading
  • 0 Have read

Buy this book

Last edited by NicolasKaiser
February 14, 2020 | History

The Tao of Network Security Monitoring

Beyond Intrusion Detection

  • 0 Ratings
  • 0 Want to read
  • 1 Currently reading
  • 0 Have read

This edition doesn't have a description yet. Can you add one?

Publish Date
Language
English
Pages
832

Buy this book

Previews available in: English

Edition Availability
Cover of: Tao of Network Security Monitoring
Tao of Network Security Monitoring: Beyond Int
2021, Pearson Education, Limited
in English
Cover of: The Tao of network security monitoring
The Tao of network security monitoring: beyond intrusion detection
2005, Addison-Wesley
in English
Cover of: The Tao of Network Security Monitoring
The Tao of Network Security Monitoring: Beyond Intrusion Detection
July 12, 2004, Addison-Wesley Professional
Paperback in English

Add another edition?

Book Details


Table of Contents

Foreword Page xvii
Preface Page xix
About the Author Page xxxi
About the Contributors Page xxxiii
Part I. Introduction to Network Security Monitoring Page 1
Chapter 1. The Security Process Page 3
Chapter 2. What is Network Security Monitoring? Page 25
Chapter 3. Deployment Considerations Page 45
Part II. Network Security Monitoring Products Page 103
Chapter 4. The Reference Intrusion Model Page 105
Chapter 5. Full Content Data Page 119
Chapter 6. Additional Data Analysis Page 173
Chapter 7. Session Data Page 211
Chapter 8. Statistical Data Page 247
Chapter 9. Alert Data: Bro and Prelude Page 285
Chapter 10. Alert Data: NSM Using Sguil Page 317
Part III. Network Security Monitoring Processes Page 345
Chapter 11. Best Practices Page 347
Chapter 12. Case Studies for Managers Page 385
Part IV. Network Security Monitoring People Page 403
Chapter 13. Analyst Training Program Page 405
Chapter 14. Discovering DNS Page 433
Chapter 15. Harnessing the Power of Session Data Page 473
Chapter 16. Packet Monkey Heaven Page 491
Part V. The Intruder versus Network Security Monitoring Page 519
Chapter 17. Tools for Attacking Network Security Monitoring Page 521
Chapter 18. Tactics for Attacking Network Security Monitoring Page 583
Epilogue. The Future of Network Security Monitoring Page 651
Part VI. Appendixes Page 661
Appendix A. Protocol Header Reference Page 661
Appendix B. Intellectual History of Network Security Monitoring Page 685
Appendix C. Protocol Anomaly Detection Page 757
Index. Page 765

Contributors

Foreword
Ron Gula

The Physical Object

Format
Paperback
Pagination
xxxiv, 798p.
Number of pages
832
Dimensions
9.2 x 7 x 1.5 inches
Weight
2.6 pounds

ID Numbers

Open Library
OL9627802M
ISBN 10
0321246772
ISBN 13
9780321246776
Library Thing
561362
Goodreads
196307

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
February 14, 2020 Edited by NicolasKaiser add table of contents, foreword, pagination
August 12, 2010 Edited by IdentifierBot added LibraryThing ID
April 24, 2010 Edited by Open Library Bot Fixed duplicate goodreads IDs.
April 16, 2010 Edited by bgimpertBot Added goodreads ID.
April 30, 2008 Created by an anonymous user Imported from amazon.com record