k.A. 安防监控-产品快照
- 品牌:
- k.A.
- 型号:
- k.A.
* 所有产品信息均源于第三方公开数据或用户上传,工业链仅整合供参考,真实价格货期请联系供应商确认.
供应商名称 | 电话 | 备注 |
---|---|---|
暂无展示,可咨询在线客服 | 400-811-6961 | 微信咨询,cs10@gchane.com , QQ1653501665 |
产品介绍
k.A. 安防监控
Tao of Network Security Monitoring, The, Beyond Intrusion Detection
k.A.
Artikel-Nr.: 178-9780321246776 Hersteller: k.A. Herst.-Nr.: k.A. EAN/GTIN: k.A. Quickly develop and apply the skills needed to detect, prevent, and respond to new and emerging computer security exploits. Explores examples of actual compromised networks to illustrate how losses could have been avoided through network security monitoring. Written by Richard Bejtlich--a recognized authority and speaker on digital security. Foreword by Ron Gula, the original author of the Dragon intrusion detection system. Launch at Black Hat USA, July 26-29, in Las Vegas. Once your security is breached, everyone will ask the same question: now what? Answering this question has cost companies hundreds of thousands of dollars in incident response and computer forensics fees. This book reduces the investigative workload of computer security incident response teams (CSIRT) by posturing organizations for incident response success. Firewalls can fail. Intrusion-detection systems can be bypassed. Network monitors can be overloaded. These are the alarming but true facts about network security. In fact, too often, security administrators' tools can serve as gateways into the very networks they are defending. Now, a novel approach to network monitoring seeks to overcome these limitations by providing dynamic information about the vulnerability of all parts of a network. Called network security monitoring (NSM), it draws on a combination of auditing, vulnerability assessment, intrusion detection and prevention, and incident response for the most comprehensive approach to network security yet. By focusing on case studies and the application of opensource tools, the author helps readers gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents.
Startseite Fachbücher Netzwerkbücher