Applied Network Security Monitoring et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus


ou
Identifiez-vous pour activer la commande 1-Click.
ou
en essayant gratuitement Amazon Premium pendant 30 jours. Votre inscription aura lieu lors du passage de la commande. En savoir plus.
Amazon Rachète votre article
Recevez un chèque-cadeau de EUR 7,63
Amazon Rachète cet article
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Applied Network Security Monitoring sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Applied Network Security Monitoring: Collection, Detection, and Analysis [Anglais] [Broché]

Chris Sanders , Jason Smith

Prix : EUR 37,93 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 2 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le samedi 30 août ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 25,92  
Broché EUR 37,93  
Vendez cet article - Prix de rachat jusqu'à EUR 7,63
Vendez Applied Network Security Monitoring: Collection, Detection, and Analysis contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 7,63, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Description de l'ouvrage

20 janvier 2014

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.

Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster.

The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data.

If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.



  • Discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst
  • Provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, and Argus
  • Loaded with practical examples containing real PCAP files you can replay, and uses Security Onion for all its lab examples
  • Companion website includes up-to-date blogs from the authors about the latest developments in NSM

Offres spéciales et liens associés



Détails sur le produit


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.9 étoiles sur 5  15 commentaires
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent guide for starting and expanding a Network Security Pratice. 17 décembre 2013
Par Wesley Allen - Publié sur Amazon.com
Format:Broché
Great book! If you are totally new to the practice of NSM then all you need to get set up, capture some data and start doing some analysis is in here. If you are already doing some NSM work, then this will help you extend and expand into new areas. The authors focus on open source / free programs and utilities, so the only cost to start a IDS is some hardware and your time.

I have been doing security for awhile, but not much focused intrusion detection before my current position. This book really helped "fill in the gaps" in my knowledge of NSM and give me a push in the right direction as far as using SiLK and a couple of the other tools. There is more then enough info to get started, but not to much that would be overly specific to a given setup, so it is still up to you to do a bit of research and dig deeper into the areas that the book introduces that you might want to use in your day to day work. You do need to have the basics of networking, security and TCP/UDP/IP down first, but they do a good job starting slow and building up.

I read through the book pretty quickly to pick up the areas I want to work in more, and will continue to use it as a reference in my work.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Should be read by anyone starting or involved in network security monitoring! 11 juillet 2014
Par Bryon Hundley - Publié sur Amazon.com
Format:Broché
Another outstanding PRACTICAL approach by Chris Sanders accompanied by Jason Smith this round. This book should be required reading for all intrusion analyst and those looking to develop a security monitoring program. The ACF mentioned in the book should be the standard for building a data collection architecture in my opinion. Organizations use the "everything and the kitchen sink" approach all to often (like let's throw everything into Arcsight) without looking at what they should really be collecting and defining out the results that should be achieved.
I am also a strong believer and practitioner of the Threat Centric approach mentioned in the book. It seems the industry is turning in that direction and seeing threats for what they are instead of each falling into a neat category. It's the right approach and this book applies it in a practical manner that makes sense.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great book for novice and experienced information security persons 4 juin 2014
Par Stephen R - Publié sur Amazon.com
Format:Broché
I chose a five star because I believe the book provides junior and novice SOC personal alike; a well-rounded understanding of information security monitoring.

Applied NSM provides background to adversarial motivations by identifying and mitigating threats that malicious actors may pose to an organization. I enjoyed the examples that are provided in order to drive home points that the authors convey. While providing a number of solutions to help shorten the kill-chain, the authors also explain some of the challenges that SOCs often see whether personal, technological and/or financial. While a small portion of the book is dedicated to the overall SOC program, the authors provide feedback that can be helpful for technical and leadership alike.

The authors do a good job of providing a holistic view of SOC operations in order to help analysts understand how all of the components should come together. While shiny tools can make quick work of identifying potential threats, it does not do the analyst good if they cannot understand why. This books helps to fill the capability gap with use of open-source tool examples in order help provide the reader a better understanding of how the wheels spin. The authors cover a large amount of detail for setting up NSM systems, from PF-RING to data storage and retention.

Lastly, I appreciate the inclusion of network flow, packet-string, and PCAP topics; the authors do a great job describing SiLK. Often organizations dismiss the capability and economics of netflow data. From an example perspective, Security Onion is their platform of choice, but the authors include a number of useful tool alternatives such as LogStash that may not exist or complement those in prebuilt distributions.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great addition to my arsenal...... 24 mars 2014
Par Chris Williams - Publié sur Amazon.com
Format:Broché|Achat vérifié
I have been looking for some reference material to help me with the ins and outs of security monitoring. Great book, easy read. Although I wouldn't recommend it for the IT beginner as some practical hands-on experience would be required for the type of work that is outlined. I would recommend it for anyone supporting or even contemplating a NSM solution.

Chris....great job! I like the technical level of your writing it keeps the reader engaged and doesn't me to sleep.

C.Will
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A must read book for anyone doing NSM or SOC work! 19 mars 2014
Par Jason Lawrence - Publié sur Amazon.com
Format:Broché|Achat vérifié
If you are currently practicing network security monitoring or considering getting in to this field you should read this book.
The depth and breadth of this text walks you through the establishment of an NSM capability through the staffing of a SOC and the processes one should consider implementing to run a successful NSM practice.
All the examples in the text are accompanied by a practical demonstration utilizing Security Onion which is a self contained NSM environment which has been successfully implemented in numerous enterprises.
The books covers the technical aspects of NSM without sacrificing the management aspect of running an NSM. Additionally, incident responders will also find value in this text. It includes topics related to post event log analysis as well is the use of netflow data in the day to day operation of NSM.
If you practice NSM, manage a SOC or are just curious, this is the book to read.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?