博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
The Tao of Network Security Monitoring: Beyond Intrusion Detection
阅读量:4232 次
发布时间:2019-05-26

本文共 1132 字,大约阅读时间需要 3 分钟。

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 - topmvp

In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents.

Inside, you will find in-depth information on the following areas.
*The NSM operational framework and deployment considerations.
*How to use a variety of open-source toolsincluding Sguil, Argus, and Etherealto mine network traffic for full content, session, statistical, and alert data.
*Best practices for conducting emergency NSM in an incident response scenario, evaluating monitoring vendors, and deploying an NSM architecture.
*Developing and applying knowledge of weapons, tactics, telecommunications, system administration, scripting, and programming for NSM.
*The best tools for generating arbitrary packets, exploiting flaws, manipulating traffic, and conducting reconnaissance.
http://rapidshare.com/files/53732042/0321246772.zip
你可能感兴趣的文章
谷歌面试题,你敢回答吗。
查看>>
程序一点点地写,日子一天天地过
查看>>
Android 安全攻防(一):SEAndroid的编译
查看>>
Android 安全攻防(二): SEAndroid bionic
查看>>
cuda如何做软连接切换
查看>>
小飞机的一些设置解释
查看>>
目标检测里正负样本和数据增广
查看>>
python和C++的交互方式
查看>>
ubuntu快捷键
查看>>
npaint (31M)-图片去水印等
查看>>
学英语以及中文快速阅读的启迪,从“为什么全世界只有中日两个国家弹幕视频网站成为流行?”说开去
查看>>
什么是人工神经网络
查看>>
神经网络的发展历史
查看>>
TED演讲:Jeff Hawkins.大脑的工作原理是什么
查看>>
所谓的语义信息
查看>>
git版本回退
查看>>
如何在Github中删除已有仓库或文件
查看>>
Predictive learning vs. representation learning
查看>>
android SDK工具下载
查看>>
Hibernateday05继承关系joined-subclass映射策略
查看>>