| 000 | 02186nam a22002777a 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20231013213501.0 | ||
| 008 | 210318b ||||| |||| 00| 0 eng d | ||
| 020 | _a0321246772 (pbk.) | ||
| 040 |
_aCvSU-CCAT Campus Library. _bEnglish _cCvSU-CCAT Campus Library. _erda. |
||
| 050 |
_aCIR TK 5105.59 _bB45 2005 |
||
| 100 |
_aBejtlich, Richard, Author. _92637 |
||
| 245 |
_aThe Tao of network security monitoring : _bbeyond intrusion detection / _cRichard Bejtlich ; foreword by Ron Gula. |
||
| 260 |
_aBoston : _bAddison-Wesley, _cc2005. |
||
| 300 |
_axxxiv, 798 pages : _billustrations ; _c24 cm |
||
| 504 | _aIncludes index | ||
| 505 | _aContents Ch. 1 The security process 3 Ch. 2 What is network security monitoring? 25 Ch. 3 Deployment considerations 45 Ch. 4 The reference intrusion model 105 Ch. 5 Full content data 119 Ch. 6 Additional data analysis 173 Ch. 7 Session data 211 Ch. 8 Statistical data 247 Ch. 9 Alert data : Bro and Prelude 285 Ch. 10 Alert data : NSM using Sguil 317 Ch. 11 Best practices 347 Ch. 12 Case studies for managers 385 Ch. 13 Analyst training program 405 Ch. 14 Discovering DNS 433 Ch. 15 Harnessing the power of session data 473 Ch. 16 Packet monkey heaven 491 Ch. 17 Tools for attacking network security monitoring 521 Ch. 18 Tactics for attacking network security monitoring 583 Epilogue : the future of network security monitoring 651 App. A Protocol header reference 663 App. B Intellectual history of network security monitoring 685 App. C Protocol anomaly detection | ||
| 520 | _aUsing real-life case studies of compromised networks, this title shows readers how to quickly develop and apply the skills necessary to detect, prevent, and respond to new and emerging threats to computer security | ||
| 546 | _aIn English text. | ||
| 650 |
_aComputer networks _vSecurity measures. _92586 |
||
| 650 |
_aElectrical and Computer Engineering. _97850 |
||
| 650 |
_aEngineering and Applied Sciences. _97851 |
||
| 650 |
_aTelecommunications. _91770 |
||
| 942 |
_cBK _hTK 5105.59 B45 2005 _kCIR _2lcc |
||
| 999 |
_c909 _d909 |
||