Skip to Main Content (Press Enter)
The Practice of Network Security Monitoring by Richard Bejtlich
Add The Practice of Network Security Monitoring to bookshelf
Add to Bookshelf

The Practice of Network Security Monitoring

Best Seller
The Practice of Network Security Monitoring by Richard Bejtlich
Paperback $59.99
Jul 15, 2013 | ISBN 9781593275099

Buy from Other Retailers:

See All Formats (1) +
  • $59.99

    Jul 15, 2013 | ISBN 9781593275099

    Buy from Other Retailers:

  • Jul 15, 2013 | ISBN 9781593275341

    Buy from Other Retailers:

Product Details

Praise

“A comprehensive guide. Certain to make the reader a better information security practitioner, and their network more secure.”
—Ben Rothke, Slashdot

“If you are in cyber security, this is a must read. The book is the best resource for tools I have seen anywhere.”
—Stephen Northcutt, SANS Institute 

“A very well written technical book. I would recommend this for anyone getting into the field of incident response who doesn’t have a great understanding of NSM.”
—Greg Hetrick, PaulDotCom 

“Deploying NSM not only means you can quickly identify, contain, and remediate intrusions, it gives you insight into the network as a whole.”
—Michael W. Lucas, author of Absolute OpenBSD, 2nd Edition 

“The Practice of Network Security Monitoring: the best surveillance book you’ll read anytime soon.”
—Peter N. M. Hansteen, author of The Book of PF 

“This gem from No Starch Press covers the life-cycle of Network Security Monitoring (NSM) in great detail and leans on Security Onion as its backbone. I recommend an immediate download of the latest version of Security Onion and a swift purchase of Richard’s book.”
—Russ McRee, senior security analyst, Microsoft 

“The principles Bejtlich outlines for running your security monitoring are the kind of best practice you should apply to any important server.”
—Mary Branscombe, ZDNet 

“If you want to know what to do when intruders arrive on your network and how to best prepare for that eventuality, you must read this book.”
—Sandra Henry-Stocker, ITWorld

“Bejtlich is a master of his craft and also possesses the rare gift of being able to share his knowledge in a comprehensible way.”
—Richard Austin, IEEE Cipher

“As tech books go, it’s a pretty fun ride.”
—Michael Larsen, Testhead

Table Of Contents

Foreword by Todd Heberlein
Preface
Part I: Getting Started
Chapter 1: Network Security Monitoring Rationale
Chapter 2: Collecting Network Traffic: Access, Storage, and Management
Part II: Security Onion Deployment
Chapter 3: Stand-alone NSM Deployment and Installation
Chapter 4: Distributed Deployment
Chapter 5: SO Platform Housekeeping
Part III: Tools
Chapter 6: Command Line Packet Analysis Tools
Chapter 7: Graphical Packet Analysis Tools
Chapter 8: NSM Consoles
Part IV: NSM in Action
Chapter 9: NSM Operations
Chapter 10: Server-side Compromise
Chapter 11: Client-side Compromise
Chapter 12: Extending SO
Chapter 13: Proxies and Checksums
Conclusion
Appendix
SO Scripts and Configuration
Index

Looking for More Great Reads?
21 Books You’ve Been Meaning to Read