Check nearby libraries
Buy this book
Last edited by NicolasKaiser
February 14, 2020 | History
This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book
Previews available in: English
Showing 3 featured editions. View all 3 editions?
Edition | Availability |
---|---|
1
Tao of Network Security Monitoring: Beyond Int
2021, Pearson Education, Limited
in English
0132603365 9780132603362
|
zzzz
Libraries near you:
WorldCat
|
2
The Tao of network security monitoring: beyond intrusion detection
2005, Addison-Wesley
in English
0321246772 9780321246776
|
eeee
|
3
The Tao of Network Security Monitoring: Beyond Intrusion Detection
July 12, 2004, Addison-Wesley Professional
Paperback
in English
0321246772 9780321246776
|
aaaa
Libraries near you:
WorldCat
|
Book Details
Table of Contents
Foreword
Page xvii
Preface
Page xix
About the Author
Page xxxi
About the Contributors
Page xxxiii
Part I.
Introduction to Network Security Monitoring
Page 1
Chapter 1.
The Security Process
Page 3
Chapter 2.
What is Network Security Monitoring?
Page 25
Chapter 3.
Deployment Considerations
Page 45
Part II.
Network Security Monitoring Products
Page 103
Chapter 4.
The Reference Intrusion Model
Page 105
Chapter 5.
Full Content Data
Page 119
Chapter 6.
Additional Data Analysis
Page 173
Chapter 7.
Session Data
Page 211
Chapter 8.
Statistical Data
Page 247
Chapter 9.
Alert Data: Bro and Prelude
Page 285
Chapter 10.
Alert Data: NSM Using Sguil
Page 317
Part III.
Network Security Monitoring Processes
Page 345
Chapter 11.
Best Practices
Page 347
Chapter 12.
Case Studies for Managers
Page 385
Part IV.
Network Security Monitoring People
Page 403
Chapter 13.
Analyst Training Program
Page 405
Chapter 14.
Discovering DNS
Page 433
Chapter 15.
Harnessing the Power of Session Data
Page 473
Chapter 16.
Packet Monkey Heaven
Page 491
Part V.
The Intruder versus Network Security Monitoring
Page 519
Chapter 17.
Tools for Attacking Network Security Monitoring
Page 521
Chapter 18.
Tactics for Attacking Network Security Monitoring
Page 583
Epilogue.
The Future of Network Security Monitoring
Page 651
Part VI.
Appendixes
Page 661
Appendix A.
Protocol Header Reference
Page 661
Appendix B.
Intellectual History of Network Security Monitoring
Page 685
Appendix C.
Protocol Anomaly Detection
Page 757
Index.
Page 765
Contributors
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created April 30, 2008
- 7 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
February 14, 2020 | Edited by NicolasKaiser | add table of contents, foreword, pagination |
August 12, 2010 | Edited by IdentifierBot | added LibraryThing ID |
April 24, 2010 | Edited by Open Library Bot | Fixed duplicate goodreads IDs. |
April 16, 2010 | Edited by bgimpertBot | Added goodreads ID. |
April 30, 2008 | Created by an anonymous user | Imported from amazon.com record |