000 | 01759cam a22003498i 4500 | ||
---|---|---|---|
999 |
_c96006 _d96006 |
||
001 | ocm17763804 | ||
003 | IE-CoIT | ||
005 | 20211014062608.0 | ||
008 | 130604s2013 cau 000 0 eng | ||
010 | _a2013017966 | ||
020 | _a9781593275099 (pbk) | ||
020 | _a1593275099 | ||
029 | _aT54781 | ||
040 |
_aDLC _beng _cDLC _erda _dDLC |
||
082 | 0 | 4 | _a004.6 |
100 | 1 |
_aBejtlich, Richard. _954161 |
|
245 | 1 | 4 |
_aThe practice of network security monitoring : _bunderstanding incident detection and response / _cRichard Bejtlich. |
264 | 1 |
_aSan Francisco : _bNo Starch Press, _c2013. |
|
300 |
_axxx, 341 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _2rdacontent |
||
337 |
_aunmediated _2rdamedia |
||
338 |
_avolume _2rdacarrier |
||
500 | _aIncludes index. | ||
505 | 0 | _aPart I: Getting Started -- Network Security Monitoring Rationale -- Collecting Network Traffic: Access, Storage and Management -- Part II. Security Onion Deployment -- Stand-alone NSM Deployment and Installation -- Distributed Deployment -- SO Platform Housekeeping -- Part III: Tools -- Command Line Packet Analysis Tools -- Graphical Packet Analysis Tools -- NSM Consoles -- Part IV:. NSM in Action -- NSM Operations -- Server-side Compromise -- Client-side Compromise -- Extending SO -- Proxies and Checksums -- Conclusion. | |
650 | 0 |
_aComputer networks _xSecurity measures _945520 |
|
650 | 0 |
_aElectronic countermeasures. _9110329 |
|
907 |
_a.b11106396 _b131127 _c131004 |
||
942 |
_n0 _2ddc |
||
960 |
_ac _b1 _c _d _e _f _g _h _i _j41.88 _kb _ld205 _m2013-10-31 _n _o0 _p _q2013-11-26 _r _s _ta _u _v57484 _w _x _y0 _z.o10137889 |
||
961 |
_aT54781 _e0 _fRyan, Vincent _hSTAFF _ifod _lc _md205 |
||
998 |
_ac _b131127 _cm _da _e- _feng _gcau _h4 |