The practice of network security monitoring : understanding incident detection and response /
I tiakina i:
Kaituhi matua: | |
---|---|
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
San Francisco :
No Starch Press,
2013.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- Foreword / by Todd Heberlein
- Preface
- Part I. Getting Started
- The Rationale
- Collecting Traffic
- Part II. Security Onion Deployment
- Standalone Deployment
- Distributed Deployment
- Housekeeping
- Part III. Tools
- Command Line Packet Analysis Tools
- Graphical Packet Analysis Tools
- Consoles
- Part III. NSM in Action
- Collection, Analysis, Escalation, and Resolution
- Server-Side Compromise
- Client-Side Compromise
- Extending SO
- Proxies and Checksums
- Conclusion
- Appendix A: Security Onion Scripts and Configuration / by Doug Burks.