|
Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.
You'll learn how to:
–Determine where to deploy NSM platforms, and size them for the monitored networks
–Deploy stand-alone or distributed NSM installations
–Use command line and graphical packet analysis tools, and NSM consoles
–Interpret network evidence from server-side and client-side intrusions
–Integrate threat intelligence into NSM software to identify sophisticated adversaries
There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be. |
|
|
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best PracticesThe user's guide to best practices in improving and enhancing security in a SAP landscape.
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and... | | | | The Oncogenomics Handbook (Cancer Drug Discovery and Development)
An integrated overview of cancer drug discovery and development from the bench to the clinic, showing with broad strokes and representative examples the drug development process as a network of linked components leading from the discovered target to the ultimate therapeutic product. Following a systems biology approach, the authors explain... |
A Practical Guide to the Wiring RegulationsThe Third Edition has been updated to take account of the 2001 amendments to the Wiring Regulations, including revisions on:
- protection against overcurrent
- isolation and switching
- zoning requirements for locations containing a bath or shower
- construction site installations
-... | | | | Embedded Systems for Smart Appliances and Energy Management
The short answer to the question is “yes!” – provided that we can satisfy a key
requirement: we must achieve the widespread deployment of intelligent, low-cost,
distributed communications that operate down to the level of individual household
and office appliances. To understand why we need such a communications... |
|