The Practice of Network Security Monitoring: Understanding Incident Detection and Response,Used

The Practice of Network Security Monitoring: Understanding Incident Detection and Response,Used

In Stock
SKU: DADAX1593275099
Brand: No Starch Press
Regular price$63.29
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Network security is not simply about building impenetrable wallsdetermined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networksno prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendorneutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networksDeploy standalone or distributed NSM installationsUse command line and graphical packet analysis tools, and NSM consolesInterpret network evidence from serverside and clientside intrusionsIntegrate threat intelligence into NSM software to identify sophisticated adversariesThere?s no foolproof way to keep attackers out of your network. But when they get in, you?ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

  • Q: How many pages does this book have? A: This book has three hundred seventy-six pages. It provides comprehensive insights into network security monitoring.
  • Q: What are the dimensions of this book? A: The dimensions of this book are seven inches in length, zero point seventy-four inches in width, and nine point twenty-five inches in height. It's a standard paperback size.
  • Q: What type of binding does this book have? A: This book is paperback bound. This binding style is lightweight and flexible, making it easy to handle.
  • Q: Who is the author of this book? A: The author of this book is Richard Bejtlich. He is a well-known expert in the field of network security.
  • Q: What is the main topic of this book? A: The main topic of this book is network security monitoring. It focuses on detecting and responding to security incidents.
  • Q: Is this book suitable for beginners? A: Yes, this book is suitable for beginners. It requires no prior experience in network security, making it accessible for all skill levels.
  • Q: How can I apply the concepts from this book? A: You can apply the concepts by implementing network security monitoring strategies in your organization. The book provides step-by-step guidance on setting up NSM operations.
  • Q: Are there any prerequisites to understanding this book? A: No, there are no prerequisites to understanding this book. It's designed to be user-friendly for individuals new to network security.
  • Q: How should I handle this book to keep it in good condition? A: To keep this book in good condition, store it in a cool, dry place and avoid exposing it to direct sunlight. Handle it gently to prevent wear and tear.
  • Q: Is there a warranty on this book? A: No, books typically do not come with a warranty. However, check the return policy for any purchase issues.
  • Q: What if this book arrives damaged? A: If this book arrives damaged, you should contact the seller for a return or exchange. Most retailers have customer service policies for such situations.
  • Q: Can I find comparisons with other network security books? A: Yes, this book can be compared with other network security titles. It emphasizes practical application of NSM, which may differ from more theoretical works.
  • Q: Is this book relevant for advanced security professionals? A: Yes, this book is relevant for advanced security professionals as well. It provides insights that can enhance existing knowledge of NSM.
  • Q: Does this book cover specific tools for network security? A: Yes, this book covers various tools for network security monitoring. It focuses on open-source software and vendor-neutral tools.
  • Q: What should I do if I have questions about the content? A: If you have questions about the content, you can refer to the book's index or glossary for clarification, or seek out online forums for discussions.
  • Q: Is this book recommended for IT students? A: Yes, this book is highly recommended for IT students. It provides foundational knowledge in network security that is essential for their studies.

Recently Viewed