Research breakthrough possible @S-Logix pro@slogix.in

Office Address

Social List

The Tao of Network Security Monitoring: Beyond Intrusion Detection

The Tao of Network Security Monitoring: Beyond Intrusion Detection

Top Research Book in The Tao of Network Security Monitoring: Beyond Intrusion Detection

Author(s) Name:  Richard Bejtlich

About the Book:

   The book is for technical audience as well as for those who manage network security, interact with clients, train security staff and are responsible for making decisions, with the author sharing his extensive experience and using case studies to illustrate best practices. The mid-section of the book goes into details of how to induct and mentor staff young staff into NSM activity, and is an excellent read for anyone who wants to hire or become a NSM analyst.
   Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes—resulting in decreased impact from unauthorized activities.

Table of Contents

  • The Security Process
  • Additional Data Analysis
  • Session Data
  • Statistical Data
  • Bro and Prelude
  • NSM Using Sguil
  • Harnessing the Power of Session Data
  • Packet Monkey Heaven
  • Network Security Monitoring Products
  • Tactics for Attacking Network Security
  • Detection
  • ISBN:  9780132702041

    Publisher:   Pearson Education

    Year of Publication:  2004

    Book Link:  Home Page Url