Text
The practice of network security monitoring: understanding incident detection and response
Table of contents:
Preface
Part I. Getting Started
The Rationale
Collecting Traffic
Part II. Security Onion Deployment
Standalone Deployment
Distributed Deployment
Housekeeping
Part III. Tools
Command Line Packet Analysis Tools
Graphical Packet Analysis Tools
Consoles
Part III. NSM in Action
Collection, Analysis, Escalation, and Resolution
Server-Side Compromise
Client-Side Compromise
Extending SO
Proxies and Checksums
Conclusion
Appendix A: Security Onion Scripts and Configuration / by Doug Burks
No other version available