Practical network security monitoring : (Record no. 5110)

MARC details
000 -LEADER
fixed length control field 01651nam a2200193Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NUBLRC
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 241210s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-1-09835-255-4
040 ## - CATALOGING SOURCE
Transcribing agency NUBLRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number GC TK 5105.5 G73 2020 c.1
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Graham, Elizabeth S.
245 #0 - TITLE STATEMENT
Title Practical network security monitoring :
Remainder of title using free software
Statement of responsibility, etc. Elizabeth S. Graham
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. [Place of publication not identified] :
Name of publisher, distributor, etc. [publisher not identified],
Date of publication, distribution, etc. c2020
300 ## - PHYSICAL DESCRIPTION
Extent 332 pages :
Other physical details color illustration ;
Dimensions 23cm.
365 ## - TRADE PRICE
Price amount USD 59.97
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Part 1. Install and Configure Security Onion -- Part 2. SGUIL -- Part 3. Packet Capture (PCAP) Analysis -- Part 4. Security Onion Integrations -- Part 5. Visual Analysis Tools -- Part 6. Intrusion Detection System (IDS) Rules -- Part 7. Testing IDS Rules -- Part 8. Putting it all together -- Part 9. Test your knowledge -- Part 10. Answers to test your knowledge -- Part 11. Defending Against threats.
520 ## - SUMMARY, ETC.
Summary, etc. This book is intended to guide beginner through intermediate users how to use free software to collect, monitor, and analyze network traffic to detect, identify, and defend against cyber threats to your network. It provides practical exercise to learn how to use free software to identify threat s to your network. The practical exercises provide step-by-step instructions allowing you to install, configure, and use the free tools. This book is not intended to be an all- inclusive guide to defending your network and assets, but is intended to provide you with the hands-on experience to analyze your network traffic and determine is traffic is malicious.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Library of Congress Classification     Information Technology NU BALIWAG NU BALIWAG General Circulation   Purchased - Amazon   GC TK 5105.5 G73 2020 c.1 NUBUL000004570 12/12/2024 12/12/2024 Books

© 2023 NU LIBRARY BALIWAG. All rights reserved. Privacy Policy I Powered by: KOHA