Jump to content

Applied Network Security Monitoring


Recommended Posts

41AHIogisOL_zps310amoki.jpg

 

Applied Network Security Monitoring

 

PDF | English | 65.25 MB

 

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach, complete with real-world examples that teach you the key concepts of NSM.

 

Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster.

 

The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical knowledge that you can apply immediately.

 

Discusses the proper methods for planning and executing an NSM data collection strategy.

 

Provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, PRADS, and more.

 

The first book to define multiple analysis frameworks that can be used for performing NSM investigations in a structured and systematic manner

Loaded with practical examples that make use of the Security Onion Linux distribution.

 

http://ul.to/6ridb2k0
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...