The Tao of network security monitoring : (Record no. 909)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02186nam a22002777a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20231013213501.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 210318b ||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0321246772 (pbk.) |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | CvSU-CCAT Campus Library. |
| Language of cataloging | English |
| Transcribing agency | CvSU-CCAT Campus Library. |
| Description conventions | rda. |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | CIR TK 5105.59 |
| Item number | B45 2005 |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Bejtlich, Richard, Author. |
| 9 (RLIN) | 2637 |
| 245 ## - TITLE STATEMENT | |
| Title | The Tao of network security monitoring : |
| Remainder of title | beyond intrusion detection / |
| Statement of responsibility, etc. | Richard Bejtlich ; foreword by Ron Gula. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boston : |
| Name of publisher, distributor, etc. | Addison-Wesley, |
| Date of publication, distribution, etc. | c2005. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxxiv, 798 pages : |
| Other physical details | illustrations ; |
| Dimensions | 24 cm |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes index |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Contents<br/>Ch. 1 The security process 3<br/>Ch. 2 What is network security monitoring? 25<br/>Ch. 3 Deployment considerations 45<br/>Ch. 4 The reference intrusion model 105<br/>Ch. 5 Full content data 119<br/>Ch. 6 Additional data analysis 173<br/>Ch. 7 Session data 211<br/>Ch. 8 Statistical data 247<br/>Ch. 9 Alert data : Bro and Prelude 285<br/>Ch. 10 Alert data : NSM using Sguil 317<br/>Ch. 11 Best practices 347<br/>Ch. 12 Case studies for managers 385<br/>Ch. 13 Analyst training program 405<br/>Ch. 14 Discovering DNS 433<br/>Ch. 15 Harnessing the power of session data 473<br/>Ch. 16 Packet monkey heaven 491<br/>Ch. 17 Tools for attacking network security monitoring 521<br/>Ch. 18 Tactics for attacking network security monitoring 583<br/> Epilogue : the future of network security monitoring 651<br/>App. A Protocol header reference 663<br/>App. B Intellectual history of network security monitoring 685<br/>App. C Protocol anomaly detection |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Using real-life case studies of compromised networks, this title shows readers how to quickly develop and apply the skills necessary to detect, prevent, and respond to new and emerging threats to computer security |
| 546 ## - LANGUAGE NOTE | |
| Language note | In English text. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| Form subdivision | Security measures. |
| 9 (RLIN) | 2586 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Electrical and Computer Engineering. |
| 9 (RLIN) | 7850 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Engineering and Applied Sciences. |
| 9 (RLIN) | 7851 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Telecommunications. |
| 9 (RLIN) | 1770 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Book |
| Classification part | TK 5105.59 B45 2005 |
| Call number prefix | CIR |
| Source of classification or shelving scheme | Library of Congress Classification |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Coded location qualifier | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Library of Congress Classification | Book | Cavite State University - CCAT Campus | Cavite State University - CCAT Campus | GCS | 08/18/2011 | Donated by Mr. Arminio Grepo | GCS | CIR TK 5105.59 B45 2005 | R0010293 | 10/15/2025 | c.1 | 03/18/2021 | Book | ||||
| Library of Congress Classification | Book | Cavite State University - CCAT Campus | Cavite State University - CCAT Campus | GCS | 08/18/2011 | Donated by Mr. Arminio Grepo | GCS | CIR TK 5105.59 B45 2005 | R0010294 | 10/15/2025 | c.2 | 10/10/2023 | Book | ||||
| Library of Congress Classification | Book | Cavite State University - CCAT Campus | Cavite State University - CCAT Campus | GCS | 08/18/2011 | Donated by Mr. Arminio Grepo | GCS | CIR TK 5105.59 B45 2005 | R0010295 | 10/15/2025 | c.3 | 10/10/2023 | Book | ||||
| Library of Congress Classification | Book | Cavite State University - CCAT Campus | Cavite State University - CCAT Campus | GCS | 08/18/2011 | Donated by Mr. Arminio Grepo | GCS | CIR TK 5105.59 B45 2005 | R0010296 | 10/15/2025 | c.4 | 10/10/2023 | Book | ||||
| Library of Congress Classification | Book | Cavite State University - CCAT Campus | Cavite State University - CCAT Campus | GCS | 08/18/2011 | Donated by Mr. Arminio Grepo | GCS | CIR TK 5105.59 B45 2005 | R0010297 | 10/15/2025 | c.5 | 10/10/2023 | Book | ||||
| Library of Congress Classification | Book | Cavite State University - CCAT Campus | Cavite State University - CCAT Campus | GCS | 08/18/2011 | Donated by Mr. Arminio Grepo | GCS | CIR TK 5105.59 B45 2005 | R0010298 | 10/15/2025 | c.6 | 10/10/2023 | Book |
