The Practice of Network Security Monitoring
By Richard Bejtlich
By Richard Bejtlich
By Richard Bejtlich
By Richard Bejtlich
Category: Science & Technology
Category: Science & Technology
-
$59.99
Jul 15, 2013 | ISBN 9781593275099
-
Jul 15, 2013 | ISBN 9781593275341
YOU MAY ALSO LIKE
Too Much Fun
Log-Linear Models, Extensions, and Applications
Quotes for All Seasons
National Parks Stickerology
Computing Legacies
Darwinizing Gaia
A Just Transition for All
Starlore of the Constellations
Houseplant
Praise
“A comprehensive guide. Certain to make the reader a better information security practitioner, and their network more secure.”
—Ben Rothke, Slashdot
“If you are in cyber security, this is a must read. The book is the best resource for tools I have seen anywhere.”
—Stephen Northcutt, SANS Institute
“A very well written technical book. I would recommend this for anyone getting into the field of incident response who doesn’t have a great understanding of NSM.”
—Greg Hetrick, PaulDotCom
“Deploying NSM not only means you can quickly identify, contain, and remediate intrusions, it gives you insight into the network as a whole.”
—Michael W. Lucas, author of Absolute OpenBSD, 2nd Edition
“The Practice of Network Security Monitoring: the best surveillance book you’ll read anytime soon.”
—Peter N. M. Hansteen, author of The Book of PF
“This gem from No Starch Press covers the life-cycle of Network Security Monitoring (NSM) in great detail and leans on Security Onion as its backbone. I recommend an immediate download of the latest version of Security Onion and a swift purchase of Richard’s book.”
—Russ McRee, senior security analyst, Microsoft
“The principles Bejtlich outlines for running your security monitoring are the kind of best practice you should apply to any important server.”
—Mary Branscombe, ZDNet
“If you want to know what to do when intruders arrive on your network and how to best prepare for that eventuality, you must read this book.”
—Sandra Henry-Stocker, ITWorld
“Bejtlich is a master of his craft and also possesses the rare gift of being able to share his knowledge in a comprehensible way.”
—Richard Austin, IEEE Cipher
“As tech books go, it’s a pretty fun ride.”
—Michael Larsen, Testhead
Table Of Contents
Foreword by Todd Heberlein
Preface
Part I: Getting Started
Chapter 1: Network Security Monitoring Rationale
Chapter 2: Collecting Network Traffic: Access, Storage, and Management
Part II: Security Onion Deployment
Chapter 3: Stand-alone NSM Deployment and Installation
Chapter 4: Distributed Deployment
Chapter 5: SO Platform Housekeeping
Part III: Tools
Chapter 6: Command Line Packet Analysis Tools
Chapter 7: Graphical Packet Analysis Tools
Chapter 8: NSM Consoles
Part IV: NSM in Action
Chapter 9: NSM Operations
Chapter 10: Server-side Compromise
Chapter 11: Client-side Compromise
Chapter 12: Extending SO
Chapter 13: Proxies and Checksums
Conclusion
Appendix
SO Scripts and Configuration
Index
21 Books You’ve Been Meaning to Read
Just for joining you’ll get personalized recommendations on your dashboard daily and features only for members.
Find Out More Join Now Sign In