Minha sacola

    Favoritar

    TAO OF NETWORK SECURITY MONITORING

    Ref:
    759728

    Por: R$ 315,00ou X de

    Comprar

    Para envios internacionais, simule o frete no carrinho de compras.

    Editora
    ISBN
    Páginas
    Peso
    Idioma
    Acabamento

    Sinopse

    Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes - resulting in decreased impact from unauthorized activities. In 'The Tao of Network Security Monitoring', Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas - The NSM operational framework and deployment considerations; - how to use a variety of open-source tools - including Sguil, Argus, and Ethereal - to mine network traffic for full content, session, statistical, and alert data. Best practices for conducting mergency NSM in an incident response scenario, evaluating monitoring vendors, and deploying an NSM architecture. Developing and applying knowledge of weapons, tactics, telecommunications, system administration, scripting, and programming for NSM. The best tools for generating arbitrary packets, exploiting flaws, manipulating traffic, and conducting reconnaissance. Whether you are new to network intrusion detection and incident response, or a computer-security veteran, this book will enable you to quickly develop and apply the skills needed to detect, prevent, and respond to new and emerging threats.
    Mostrar mais

    Ficha técnica

    Especificações

    ISBN9780321246776
    Pré vendaNão
    Peso1531g
    Autor para link
    Livro disponível - pronta entregaNão
    IdiomaInglês
    Tipo itemLIVRO IMPORTADO ADQ MERC INTERNO
    Número de páginas832
    Número da edição1ªEDIÇÃO - 2004
    Código Interno759728
    Código de barras9780321246776
    AcabamentoBROCHURA
    AutorBEJTLICH, RICHARD
    EditoraADDISON WESLEY **
    Sob encomendaSim
    Mostrar mais

    Este livro é vendido

    SOB ENCOMENDA

    Prazo estimado para disponibilidade em estoque: dias úteis

    (Sujeito aos estoques de nossos fornecedores)

    +

    Prazo do frete selecionado.

    (Veja o prazo total na sacola de compras)

    Comprar