Once your security is breached, everyone will ask the same question: now what? Answering this question has cost companies hundreds of thousands of dollars in incident response and computer forensics fees. This book reduces the investigative workload of computer security incident response teams (CSIRT) by posturing organizations for incident response success. Firewalls can fail. Intrusion-detection systems can be bypassed. Network monitors can be overloaded. These are the alarming but true facts about network security ...
Read More
Once your security is breached, everyone will ask the same question: now what? Answering this question has cost companies hundreds of thousands of dollars in incident response and computer forensics fees. This book reduces the investigative workload of computer security incident response teams (CSIRT) by posturing organizations for incident response success. Firewalls can fail. Intrusion-detection systems can be bypassed. Network monitors can be overloaded. These are the alarming but true facts about network security. In fact, too often, security administrators' tools can serve as gateways into the very networks they are defending. Now, a novel approach to network monitoring seeks to overcome these limitations by providing dynamic information about the vulnerability of all parts of a network. Called network security monitoring (NSM), it draws on a combination of auditing, vulnerability assessment, intrusion detection and prevention, and incident response for the most comprehensive approach to network security yet. By focusing on case studies and the application of opensource tools, the author helps readers gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents.
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good condition is defined as: a copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. Most items will be dispatched the same or the next working day.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very Good. Suitable for beginners, this book provides you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious. It also offers the basics of TCP/IP protocols and helps you run an open source or commercial IDS. Trade paperback (US). Glued binding. 832 p. Contains: Illustrations.