pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: THE TAO OF NETWORK SECURITY MONITORING
BEYOND INTRUSION DETECTION
By: G. Powell, Richard Bejtlich
Format: Paperback

List price: £55.49


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 0321246772
ISBN 13: 9780321246776
Publisher: PEARSON EDUCATION (US)
Pub. date: 12 July, 2004
Pages: 832
Description: Suitable for beginners, this book provides you with the knowledge you need to defend your network from attackers - both the obvious and the not so obvious. It also offers the basics of TCP/IP protocols and helps you run an open source or commercial IDS.
Synopsis: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious...If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring, Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. * The NSM operational framework and deployment considerations.* How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and alert data. * Best practices for conducting emergency NSM in an incident response scenario, evaluating monitoring vendors, and deploying an NSM architecture. * Developing and applying knowledge of weapons, tactics, telecommunications, system administration, scripting, and programming for NSM. * The best tools for generating arbitrary packets, exploiting flaws, manipulating traffic, and conducting reconnaissance. Whether you are new to network intrusion detection and incident response, or a computer-security veteran, this book will enable you to quickly develop and apply the skills needed to detect, prevent, and respond to new and emerging threats.
Illustrations: Illustrations
Publication: US
Imprint: Addison-Wesley Educational Publishers Inc
Returns: Returnable
Some other items by this author:

TOP SELLERS IN THIS CATEGORY
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
The Art of Deception (Paperback)
John Wiley & Sons Inc
Our Price : £7.30
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £62.99
more details
The Network Security Test Lab (Paperback)
John Wiley & Sons Inc
Our Price : £35.10
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
World’s Worst Superheroes GET READY FOR SOME SUPERSIZED FUN!
add to basket





New
No Cheese, Please! A fun picture book for children with food allergies - full of friendship and super-cute characters!Little Mo the mouse is having a birthday party.
add to basket

New
My Brother Is a Superhero Luke is massively annoyed about this, but when Zack is kidnapped by his arch-nemesis, Luke and his friends have only five days to find him and save the world...
add to basket


Picture Book
Animal Actions: Snap Like a Crab
By:
The first title in a new preschool series from Guilherme Karsten.
add to basket