000 01759cam a22003498i 4500
999 _c96006
_d96006
001 ocm17763804
003 IE-CoIT
005 20211014062608.0
008 130604s2013 cau 000 0 eng
010 _a2013017966
020 _a9781593275099 (pbk)
020 _a1593275099
029 _aT54781
040 _aDLC
_beng
_cDLC
_erda
_dDLC
082 0 4 _a004.6
100 1 _aBejtlich, Richard.
_954161
245 1 4 _aThe practice of network security monitoring :
_bunderstanding incident detection and response /
_cRichard Bejtlich.
264 1 _aSan Francisco :
_bNo Starch Press,
_c2013.
300 _axxx, 341 pages :
_billustrations ;
_c24 cm.
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
500 _aIncludes index.
505 0 _aPart I: Getting Started -- Network Security Monitoring Rationale -- Collecting Network Traffic: Access, Storage and Management -- Part II. Security Onion Deployment -- Stand-alone NSM Deployment and Installation -- Distributed Deployment -- SO Platform Housekeeping -- Part III: Tools -- Command Line Packet Analysis Tools -- Graphical Packet Analysis Tools -- NSM Consoles -- Part IV:. NSM in Action -- NSM Operations -- Server-side Compromise -- Client-side Compromise -- Extending SO -- Proxies and Checksums -- Conclusion.
650 0 _aComputer networks
_xSecurity measures
_945520
650 0 _aElectronic countermeasures.
_9110329
907 _a.b11106396
_b131127
_c131004
942 _n0
_2ddc
960 _ac
_b1
_c
_d
_e
_f
_g
_h
_i
_j41.88
_kb
_ld205
_m2013-10-31
_n
_o0
_p
_q2013-11-26
_r
_s
_ta
_u
_v57484
_w
_x
_y0
_z.o10137889
961 _aT54781
_e0
_fRyan, Vincent
_hSTAFF
_ifod
_lc
_md205
998 _ac
_b131127
_cm
_da
_e-
_feng
_gcau
_h4