NewTechReview: Home | Deals | Articles | Downloads (Free Software) | Videos | Newsletter (FREE) | Issues | News | Reviews | Recommend | Contest | RSS Feed



Amazon Outlet Deals - Low prices on markdowns, clearance items, and overstocks - Click here!
Scott R. Garrigus'  NewTechReview - Free new technology news, reviews, tips and techniques!
only search NewTechReview
NewTechReview is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.
SRG Sites > NewTechReview > News > The Practice of Network Security Monitoring -- New from No Starch Press
The Practice of Network Security Monitoring -- New from No Starch Press
Like this news:
Share this news: Facebook - Twitter  
In a world of ubiquitous connectivity, everyone's information is at risk. State-sponsored digital spies, organized crime syndicates, and hacktivists seek to steal, profit from, and disrupt that information. Security technologies to stop intruders have largely failed. Can anything be done?

Richard Bejtlich's answer to this question is yes. Since 1998, Bejtlich has defended networks from digital intruders. He's seen attacks against the United States military, government agencies, Internet service providers, telecommunications carriers, universities, manufacturers, and more. To combat these intrusions, Bejtlich developed a methodology called network security monitoring (NSM). Bejtlich based NSM on his experience as an intelligence officer and computer network defender in the United States Air Force, and proved its worth in the years following his military service.

NSM is a powerful way to detect, respond to, and control intrusions on networks large and small, using open source software and industry-leading practices. In his new book, The Practice of Network Security Monitoring, Bejtlich explains how to prevail against intruders: Catch them before they cause damage, using an assortment of network-centric tools and techniques. Kevin Mandia, CEO of Mandiant, calls the book "a critical resource for those tasked with safeguarding corporate secrets from unlawful, unauthorized, or unacceptable activities."

Readers of The Practice of Network Security Monitoring will learn how to:
* Determine where to deploy NSM platforms, and size them for the monitored networks
* Deploy stand-alone or distributed NSM installations
* Use command line and graphical packet analysis tools and NSM consoles
* Collect, analyze, and escalate indications and warnings when running a Computer Incident Response Team
* Interpret network evidence from server-side and client-side intrusions
* Extend NSM software to integrate threat intelligence to identify sophisticated threats

There's no foolproof way to keep attackers out of networks; determined attackers will get in eventually. NSM is designed to manage the inevitable, and The Practice of Network Security Monitoring will show readers how to build a security net to catch attackers before they inflict serious damage.

For more information, see The Practice of Network Security Monitoring: Understanding Incident Detection and Response or visit nostarch.com or oreilly.com.
Amazon Hot New Releases in Software - Click here!
 
 
[Back to the News Index]

NewTechReview: Home | RSS Feed | Deals | Articles | Downloads (Free Software) | Videos | Newsletter (FREE) | Issues | News | Reviews | Recommend | Contest

SRG Sites: DigiFreq | Power Books | NewTechReview

Copyright © 2024 by Scott R. Garrigus. All Rights Reserved. --- Privacy Policy  

NewTechReview is for informational purposes only. - Disclosure Statement