Applied network security monitoring: collection, detection, and analysis
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prev...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
2013
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780124172081/?ar |
Zusammenfassung: | Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident. |
Beschreibung: | Includes index. - Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (497 Seiten) |
ISBN: | 9780124172081 0124172083 9780124172166 0124172164 1306167833 9781306167833 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047405066 | ||
003 | DE-627-1 | ||
005 | 20240228115421.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 9780124172081 |c electronic bk. |9 978-0-12-417208-1 | ||
020 | |a 0124172083 |c electronic bk. |9 0-12-417208-3 | ||
020 | |a 9780124172166 |c electronic bk. |9 978-0-12-417216-6 | ||
020 | |a 0124172164 |c electronic bk. |9 0-12-417216-4 | ||
020 | |a 1306167833 |c ebk |9 1-306-16783-3 | ||
020 | |a 9781306167833 |c ebk |9 978-1-306-16783-3 | ||
035 | |a (DE-627-1)047405066 | ||
035 | |a (DE-599)KEP047405066 | ||
035 | |a (ORHE)9780124172081 | ||
035 | |a (DE-627-1)047405066 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Sanders, Chris |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Applied network security monitoring |b collection, detection, and analysis |c Chris Sanders, Jason Smith |
264 | 1 | |a Waltham, MA |b Syngress |c 2013 | |
300 | |a 1 Online-Ressource (497 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Includes bibliographical references and index. - Print version record | ||
520 | |a Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a Computer networks ; Security measures | |
700 | 1 | |a Smith, Jason |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780124172081 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124172081 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780124172081/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047405066 |
---|---|
_version_ | 1821494910039097344 |
adam_text | |
any_adam_object | |
author | Sanders, Chris |
author2 | Smith, Jason |
author2_role | ctb |
author2_variant | j s js |
author_facet | Sanders, Chris Smith, Jason |
author_role | aut |
author_sort | Sanders, Chris |
author_variant | c s cs |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047405066 (DE-599)KEP047405066 (ORHE)9780124172081 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02508cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-047405066</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115421.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124172081</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-417208-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124172083</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-417208-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124172166</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-417216-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124172164</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-417216-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306167833</subfield><subfield code="c">ebk</subfield><subfield code="9">1-306-16783-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306167833</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-306-16783-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047405066</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047405066</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780124172081</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047405066</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sanders, Chris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied network security monitoring</subfield><subfield code="b">collection, detection, and analysis</subfield><subfield code="c">Chris Sanders, Jason Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (497 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Jason</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780124172081</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124172081</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780124172081/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047405066 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:53Z |
institution | BVB |
isbn | 9780124172081 0124172083 9780124172166 0124172164 1306167833 9781306167833 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (497 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress |
record_format | marc |
spelling | Sanders, Chris VerfasserIn aut Applied network security monitoring collection, detection, and analysis Chris Sanders, Jason Smith Waltham, MA Syngress 2013 1 Online-Ressource (497 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Includes bibliographical references and index. - Print version record Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident. Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security Computer networks ; Security measures Smith, Jason MitwirkendeR ctb 9780124172081 Erscheint auch als Druck-Ausgabe 9780124172081 |
spellingShingle | Sanders, Chris Applied network security monitoring collection, detection, and analysis Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security Computer networks ; Security measures |
title | Applied network security monitoring collection, detection, and analysis |
title_auth | Applied network security monitoring collection, detection, and analysis |
title_exact_search | Applied network security monitoring collection, detection, and analysis |
title_full | Applied network security monitoring collection, detection, and analysis Chris Sanders, Jason Smith |
title_fullStr | Applied network security monitoring collection, detection, and analysis Chris Sanders, Jason Smith |
title_full_unstemmed | Applied network security monitoring collection, detection, and analysis Chris Sanders, Jason Smith |
title_short | Applied network security monitoring |
title_sort | applied network security monitoring collection detection and analysis |
title_sub | collection, detection, and analysis |
topic | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security Computer networks ; Security measures |
topic_facet | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security Computer networks ; Security measures |
work_keys_str_mv | AT sanderschris appliednetworksecuritymonitoringcollectiondetectionandanalysis AT smithjason appliednetworksecuritymonitoringcollectiondetectionandanalysis |