Practice of Network Security Monitoring
shared
This Book is Out of Stock!
Understanding Incident Detection and Response
English

About The Book

Network security is not simply about building impenetrable walls--determined attackers <i>will</i> eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. <p/>In <i>The Practice of Network Security Monitoring</i> Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions he teaches you how to deploy build and run an NSM operation using open source software and vendor-neutral tools. <p/>You'll learn how to: <br>-Determine where to deploy NSM platforms and size them for the monitored networks<br>-Deploy stand-alone or distributed NSM installations<br>-Use command line and graphical packet analysis tools and NSM consoles<br>-Interpret network evidence from server-side and client-side intrusions<br>-Integrate threat intelligence into NSM software to identify sophisticated adversaries <p/>There's no foolproof way to keep attackers out of your network. But when they get in you'll be prepared. <i>The Practice of Network Security Monitoring</i> will show you how to build a security net to detect contain and control them. Attacks are inevitable but losing sensitive data shouldn't be.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
4799
5099
5% OFF
Paperback
Out Of Stock
All inclusive*
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE