The practice of network security monitoring understanding incident detection and response
Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to in...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
San Francisco :
No Starch Press
2013.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628913206719 |
Tabla de Contenidos:
- Foreword / by Todd Heberlein
- Preface
- Part I. Getting Started
- The Rationale
- Collecting Traffic
- Part II. Security Onion Deployment
- Standalone Deployment
- Distributed Deployment
- Housekeeping
- Part III. Tools
- Command Line Packet Analysis Tools
- Graphical Packet Analysis Tools
- Consoles
- Part III. NSM in Action
- Collection, Analysis, Escalation, and Resolution
- Server-Side Compromise
- Client-Side Compromise
- Extending SO
- Proxies and Checksums
- Conclusion
- Appendix A: Security Onion Scripts and Configuration / by Doug Burks.