Applied Network Security Monitoring
23%
off

Applied Network Security Monitoring : Collection, Detection, and Analysis

4.27 (33 ratings by Goodreads)
By (author)  , By (author)  , By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 1 business day
When will my order arrive?

Description

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.

Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster.

The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data.

If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.
show more

Product details

  • Paperback | 496 pages
  • 190.5 x 233.68 x 25.4mm | 952.54g
  • Rockland, MA, United States
  • English
  • Illustrated; Illustrations, unspecified
  • 0124172083
  • 9780124172081
  • 85,275

Table of contents

Introduction to NSM
Driving Data Collection
The Sensor Platform
Full Packet Capture Data
Session Data
Protocol Metadata
Statistical Data
Indicators of Compromise
Target-Based Detection
Signature-Based Detection with Snort
Signature-Based Detection with Suricata
Anomaly-Based Detection with Bro
Early Warning AS&W with Honeypots
Packet Analysis
Friendly Intelligence
Hostile Intelligence
Differential Diagnosis of NSM Events
Incident Morbidity and Mortality
Malware Analysis for NSM
show more

Review Text

"... an extremely informative dive into the realm of network security data collection and analysis...well organized and thought through...I have only positive comments from my study." - The Ethical Hacker Network, Oct 31, 2014
show more

Review quote

"... an extremely informative dive into the realm of network security data collection and analysis...well organized and thought through...I have only positive comments from my study." -The Ethical Hacker Network, Oct 31, 2014
show more

Rating details

33 ratings
4.27 out of 5 stars
5 48% (16)
4 33% (11)
3 15% (5)
2 3% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X