Practical network security monitoring : (Record no. 5110)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01651nam a2200193Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NUBLRC |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 241210s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 978-1-09835-255-4 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NUBLRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | GC TK 5105.5 G73 2020 c.1 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Graham, Elizabeth S. |
245 #0 - TITLE STATEMENT | |
Title | Practical network security monitoring : |
Remainder of title | using free software |
Statement of responsibility, etc. | Elizabeth S. Graham |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | [Place of publication not identified] : |
Name of publisher, distributor, etc. | [publisher not identified], |
Date of publication, distribution, etc. | c2020 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 332 pages : |
Other physical details | color illustration ; |
Dimensions | 23cm. |
365 ## - TRADE PRICE | |
Price amount | USD 59.97 |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part 1. Install and Configure Security Onion -- Part 2. SGUIL -- Part 3. Packet Capture (PCAP) Analysis -- Part 4. Security Onion Integrations -- Part 5. Visual Analysis Tools -- Part 6. Intrusion Detection System (IDS) Rules -- Part 7. Testing IDS Rules -- Part 8. Putting it all together -- Part 9. Test your knowledge -- Part 10. Answers to test your knowledge -- Part 11. Defending Against threats. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book is intended to guide beginner through intermediate users how to use free software to collect, monitor, and analyze network traffic to detect, identify, and defend against cyber threats to your network. It provides practical exercise to learn how to use free software to identify threat s to your network. The practical exercises provide step-by-step instructions allowing you to install, configure, and use the free tools. This book is not intended to be an all- inclusive guide to defending your network and assets, but is intended to provide you with the hands-on experience to analyze your network traffic and determine is traffic is malicious. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Information Technology | NU BALIWAG | NU BALIWAG | General Circulation | Purchased - Amazon | GC TK 5105.5 G73 2020 c.1 | NUBUL000004570 | 12/12/2024 | 12/12/2024 | Books |