Text
Applied network security monitoring: collection, detection, and analysis
Table of Contents:
Chapter 1. The Practice of Applied Network Security Monitoring
Chapter 2. Planning Data Collection
Chapter 3. The Sensor Platform
Chapter 4. Session Data
Chapter 5. Full Packet Capture Data
Chapter 6. Packet String Data
Chapter 7. Detection Mechanisms, Indicators of Compromise, and Signatures
Chapter 8. Reputation-Based Detection
Chapter 9. Signature-Based Detection with Snort and Suricata
Chapter 10. The Bro Platform
Chapter 11. Anomaly-Based Detection with Statistical Data
Chapter 12. Using Canary Honeypots for Detection
Chapter 13. Packet Analysis
Chapter 14. Friendly and Threat Intelligence
Chapter 15. The Analysis Process
No other version available