Applied network security monitoring : collection, detection, and analysis / Chris Sanders, Jason Smith ; David J. Bianco, technical editor.
Material type: TextPublisher: Amsterdam ; Boston : Syngress, an imprint of Elsevier, [2014]Description: xxiv, 472 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 9780124172081 (paperback)
- 005.8 2 3
- QA76.9.A25 .S268 2014
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books | Kwara State University Library | QA76.9.A25 .S26 2014 (Browse shelf(Opens below)) | Available | 016139-01 | ||
Books | Kwara State University Library | QA76.9.A25 .S26 2014 (Browse shelf(Opens below)) | Available | 016139-02 | ||
Books | Kwara State University Library | QA76.9.A25 .S26 2014 (Browse shelf(Opens below)) | Available | 016139-03 |
Browsing Kwara State University Library shelves Close shelf browser (Hides shelf browser)
QA76.9.A25 .P59 2015 Hacking and penetration testing with low power devices / | QA76.9.A25 .P59 2015 Hacking and penetration testing with low power devices / | QA76.9.A25 .S26 2014 Applied network security monitoring : collection, detection, and analysis / | QA76.9.A25 .S26 2014 Applied network security monitoring : collection, detection, and analysis / | QA76.9.A25 .S26 2014 Applied network security monitoring : collection, detection, and analysis / | QA76.9.A25 .S73 2018 Computer security: principles and practice | QA76.9.A25 .S73 2018 Computer security: principles and practice |
Includes bibliographical references and index.
Machine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM .
There are no comments on this title.