Amazon cover image
Image from Amazon.com

Practical network security monitoring : using free software Elizabeth S. Graham

By: Material type: TextTextPublication details: [Place of publication not identified] : [publisher not identified], c2020Description: 332 pages : color illustration ; 23cmISBN:
  • 978-1-09835-255-4
LOC classification:
  • GC TK 5105.5 G73 2020 c.1
Contents:
Part 1. Install and Configure Security Onion -- Part 2. SGUIL -- Part 3. Packet Capture (PCAP) Analysis -- Part 4. Security Onion Integrations -- Part 5. Visual Analysis Tools -- Part 6. Intrusion Detection System (IDS) Rules -- Part 7. Testing IDS Rules -- Part 8. Putting it all together -- Part 9. Test your knowledge -- Part 10. Answers to test your knowledge -- Part 11. Defending Against threats.
Summary: This book is intended to guide beginner through intermediate users how to use free software to collect, monitor, and analyze network traffic to detect, identify, and defend against cyber threats to your network. It provides practical exercise to learn how to use free software to identify threat s to your network. The practical exercises provide step-by-step instructions allowing you to install, configure, and use the free tools. This book is not intended to be an all- inclusive guide to defending your network and assets, but is intended to provide you with the hands-on experience to analyze your network traffic and determine is traffic is malicious.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Shelving location Call number Status Date due Barcode
Books Books NU BALIWAG NU BALIWAG Information Technology General Circulation GC TK 5105.5 G73 2020 c.1 (Browse shelf(Opens below)) Available NUBUL000004570

Part 1. Install and Configure Security Onion -- Part 2. SGUIL -- Part 3. Packet Capture (PCAP) Analysis -- Part 4. Security Onion Integrations -- Part 5. Visual Analysis Tools -- Part 6. Intrusion Detection System (IDS) Rules -- Part 7. Testing IDS Rules -- Part 8. Putting it all together -- Part 9. Test your knowledge -- Part 10. Answers to test your knowledge -- Part 11. Defending Against threats.

This book is intended to guide beginner through intermediate users how to use free software to collect, monitor, and analyze network traffic to detect, identify, and defend against cyber threats to your network. It provides practical exercise to learn how to use free software to identify threat s to your network. The practical exercises provide step-by-step instructions allowing you to install, configure, and use the free tools. This book is not intended to be an all- inclusive guide to defending your network and assets, but is intended to provide you with the hands-on experience to analyze your network traffic and determine is traffic is malicious.

There are no comments on this title.

to post a comment.

© 2023 NU LIBRARY BALIWAG. All rights reserved. Privacy Policy I Powered by: KOHA