Related Books
Language: en
Pages: 416
Pages: 416
Type: BOOK - Published: 2014-02-10 - Publisher: "O'Reilly Media, Inc."
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Mi
Language: en
Pages: 427
Pages: 427
Type: BOOK - Published: 2017-09-08 - Publisher: "O'Reilly Media, Inc."
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical
Language: en
Pages: 497
Pages: 497
Type: BOOK - Published: 2013-11-26 - Publisher: Elsevier
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complet
Language: en
Pages: 200
Pages: 200
Type: BOOK - Published: 2014-04-04 - Publisher: World Scientific
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that
Language: en
Pages: 347
Pages: 347
Type: BOOK - Published: 2014-02-10 - Publisher: "O'Reilly Media, Inc."
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'l