Skip to product information
1 of 1
Regular price £27.19 GBP
Regular price £39.99 GBP Sale price £27.19 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 10 days lead

Applied Network Security Monitoring
Collection, Detection, and Analysis

The essential guide to becoming an NSM analyst from the ground up

Chris Sanders (Author), Jason Smith (Author)

9780124172081, Elsevier Science

Paperback, published 20 January 2014

496 pages, 40 illustrations
22.9 x 15.2 x 3.1 cm, 1.13 kg

"... an extremely informative dive into the realm of network security data collection and analysis...well organized and thought through...I have only positive comments from my study." --The Ethical Hacker Network, Oct 31, 2014

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.

Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster.

The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data.

If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.

  1. Introduction to NSM
  2. Driving Data Collection
  3. The Sensor Platform
  4. Full Packet Capture Data
  5. Session Data
  6. Protocol Metadata
  7. Statistical Data
  8. Indicators of Compromise
  9. Target-Based Detection
  10. Signature-Based Detection with Snort
  11. Signature-Based Detection with Suricata
  12. Anomaly-Based Detection with Bro
  13. Early Warning AS&W with Honeypots
  14. Packet Analysis
  15. Friendly Intelligence
  16. Hostile Intelligence
  17. Differential Diagnosis of NSM Events
  18. Incident Morbidity and Mortality
  19. Malware Analysis for NSM

Subject Areas: Network security [UTN], Computer networking & communications [UT], Computer security [UR]

View full details