The Practice of Network Security Monitoring

The Practice of Network Security Monitoring pdf epub mobi txt 电子书 下载 2025

出版者:No Starch Press
作者:Richard Bejtlich
出品人:
页数:376
译者:
出版时间:2013-8-5
价格:GBP 39.99
装帧:Paperback
isbn号码:9781593275099
丛书系列:
图书标签:
  • hack
  • 网络安全监控
  • 网络安全
  • 安全分析
  • 流量分析
  • 入侵检测
  • 威胁情报
  • 日志分析
  • 安全运维
  • 实践指南
  • 网络取证
想要找书就要到 小哈图书下载中心
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

Network Security Monitoring (NSM) is the the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. The Practice of Network Security Monitoring teaches IT and security staff how to leverage powerful NSM tools and concepts to identify threats quickly and effectively. Author Richard Bejtlich is a recognized expert in NSM and shares his 15 years of incident handling experience with the reader. In addition to teaching you how to use key monitoring tools, Bejtlich demonstrates a holistic way of thinking about detecting, responding to, and containing intruders. The Practice of Network Security Monitoring assumes no prior experience with network security monitoring, and covers designing, deploying, building, and running an NSM operation. The book focuses on open source software and vendor-neutral tools, avoiding costly and inflexible solutions.

具体描述

作者简介

Richard Bejtlich is Chief Security Officer at Mandiant and was previously Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). He is a graduate of Harvard University and the United States Air Force Academy. Bejtlich’s previous works include The Tao of Network Security Monitoring, Extrusion Detection, and Real Digital Forensics (all from Addison-Wesley). He writes on his blog (taosecurity.blogspot.com) and on Twitter as @taosecurity

目录信息

Foreward by Todd Heberlein
Preface (Download PDF)
Part I: Getting Started
Chapter 1: Network Security Monitoring Rationale
Chapter 2: Collecting Network Traffic: Access, Storage, and Management
Part II: Security Onion Deployment
Chapter 3: Stand-alone NSM Deployment and Installation
Chapter 4: Distributed Deployment
Chapter 5: SO Platform Housekeeping
Part III: Tools
Chapter 6: Command Line Packet Analysis Tools
Chapter 7: Graphical Packet Analysis Tools
Chapter 8: NSM Consoles
Part IV: NSM in Action
Chapter 9: NSM Operations
Chapter 10: Server-side Compromise
Chapter 11: Client-side Compromise
Chapter 12: Extending SO
Chapter 13: Proxies and Checksums
Conclusion
Appendix
SO Scripts and Configuration
Index
· · · · · · (收起)

读后感

评分

评分

评分

评分

评分

用户评价

评分

security onion 工具书,但网络安全监控分析思路讲的比较简略,分别讲了两个实例,服务端攻击和客户端攻击,将工具集的使用串起来。

评分

security onion 工具书,但网络安全监控分析思路讲的比较简略,分别讲了两个实例,服务端攻击和客户端攻击,将工具集的使用串起来。

评分

security onion 工具书,但网络安全监控分析思路讲的比较简略,分别讲了两个实例,服务端攻击和客户端攻击,将工具集的使用串起来。

评分

security onion 工具书,但网络安全监控分析思路讲的比较简略,分别讲了两个实例,服务端攻击和客户端攻击,将工具集的使用串起来。

评分

security onion 工具书,但网络安全监控分析思路讲的比较简略,分别讲了两个实例,服务端攻击和客户端攻击,将工具集的使用串起来。

本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

© 2025 qciss.net All Rights Reserved. 小哈图书下载中心 版权所有