000 01535cam a22002895a 4500
001 17961159
005 20201128021441.0
008 131203t2014 maua frb 001 0 eng d
020 _a9780124172081 (paperback)
040 _aDLC
_beng
_cDLC
_dDLC
_dEG-ScBUE
082 0 4 _a005.8
_222
_bSAN
100 1 _aSanders, Chris,
_d1986-
_939240
245 1 0 _aApplied network security monitoring :
_bcollection, detection, and analysis /
_cChris Sanders, Jason Smith ; editor David J. Bianco
260 _aWaltham :
_bSyngress / Elsevier,
_cc.2014.
300 _axxiv, 472 p. :
_bill. ;
_c24 cm.
500 _aIndex : p. 467-472.
504 _aIncludes bibliographical references.
505 8 _aMachine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM .
650 7 _aComputer security.
_2BUEsh
_92637
650 7 _aComputer networks
_xSecurity measures.
_2BUEsh
_92634
650 7 _aOpen source intelligence.
_2BUEsh
_939241
651 _2BUEsh
653 _bCOMSCI
_cJuly2015
_cFebruary2016
700 1 _aSmith, Jason
700 1 _aBianco, David J.,
_eeditor.
_937835
942 _2ddc
999 _c20386
_d20358