000 | 01535cam a22002895a 4500 | ||
---|---|---|---|
001 | 17961159 | ||
005 | 20201128021441.0 | ||
008 | 131203t2014 maua frb 001 0 eng d | ||
020 | _a9780124172081 (paperback) | ||
040 |
_aDLC _beng _cDLC _dDLC _dEG-ScBUE |
||
082 | 0 | 4 |
_a005.8 _222 _bSAN |
100 | 1 |
_aSanders, Chris, _d1986- _939240 |
|
245 | 1 | 0 |
_aApplied network security monitoring : _bcollection, detection, and analysis / _cChris Sanders, Jason Smith ; editor David J. Bianco |
260 |
_aWaltham : _bSyngress / Elsevier, _cc.2014. |
||
300 |
_axxiv, 472 p. : _bill. ; _c24 cm. |
||
500 | _aIndex : p. 467-472. | ||
504 | _aIncludes bibliographical references. | ||
505 | 8 | _aMachine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM . | |
650 | 7 |
_aComputer security. _2BUEsh _92637 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2BUEsh _92634 |
|
650 | 7 |
_aOpen source intelligence. _2BUEsh _939241 |
|
651 | _2BUEsh | ||
653 |
_bCOMSCI _cJuly2015 _cFebruary2016 |
||
700 | 1 | _aSmith, Jason | |
700 | 1 |
_aBianco, David J., _eeditor. _937835 |
|
942 | _2ddc | ||
999 |
_c20386 _d20358 |