The practice of network security monitoring : understanding incident detection and response /

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi matua: Bejtlich, Richard
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: San Francisco : No Starch Press, 2013.
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • Foreword / by Todd Heberlein
  • Preface
  • Part I. Getting Started
  • The Rationale
  • Collecting Traffic
  • Part II. Security Onion Deployment
  • Standalone Deployment
  • Distributed Deployment
  • Housekeeping
  • Part III. Tools
  • Command Line Packet Analysis Tools
  • Graphical Packet Analysis Tools
  • Consoles
  • Part III. NSM in Action
  • Collection, Analysis, Escalation, and Resolution
  • Server-Side Compromise
  • Client-Side Compromise
  • Extending SO
  • Proxies and Checksums
  • Conclusion
  • Appendix A: Security Onion Scripts and Configuration / by Doug Burks.