Related Books

The Tao of Network Security Monitoring
Language: en
Pages: 1050
Authors: Richard Bejtlich
Categories: Computers
Type: BOOK - Published: 2004-07-12 - Publisher: Pearson Education

GET EBOOK

"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If
The Practice of Network Security Monitoring
Language: en
Pages: 376
Authors: Richard Bejtlich
Categories: Computers
Type: BOOK - Published: 2013-07-15 - Publisher: No Starch Press

GET EBOOK

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective comput
Extrusion Detection
Language: en
Pages: 424
Authors: Richard Bejtlich
Categories: Computers
Type: BOOK - Published: 2006 - Publisher: Addison-Wesley Professional

GET EBOOK

Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks Today's most devastating security attacks are launched from within the company, b
The Practice of Network Security
Language: en
Pages: 498
Authors: Allan Liska
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: Prentice Hall Professional

GET EBOOK

InThe Practice of Network Security, former UUNet networkarchitect Allan Liska shows how to secure enterprise networks in thereal world - where you're constantly
The Practice of Network Security Monitoring
Language: en
Pages: 436
Authors: Richard Bejtlich
Categories: Computers
Type: BOOK - Published: 2013-07-15 - Publisher: No Starch Press

GET EBOOK

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective comput