Applied network security monitoring: collection, detection, and analysis
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Syngress
2014
|
Schlagworte: | |
Online-Zugang: | FLA01 FUBA1 Volltext |
Beschreibung: | Includes index Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident |
Beschreibung: | 1 Online-Ressource (XXIV, 472 S.) Ill., graph. Darst. |
ISBN: | 9780124172081 0124172083 9780124172166 0124172164 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300229 | ||
003 | DE-604 | ||
005 | 20210114 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780124172081 |c electronic bk. |9 978-0-12-417208-1 | ||
020 | |a 0124172083 |c electronic bk. |9 0-12-417208-3 | ||
020 | |a 9780124172166 |c electronic bk. |9 978-0-12-417216-6 | ||
020 | |a 0124172164 |c electronic bk. |9 0-12-417216-4 | ||
035 | |a (ZDB-33-EBS)ocn865332035 | ||
035 | |a (OCoLC)865332035 | ||
035 | |a (DE-599)BVBBV042300229 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-860 |a DE-188 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Sanders, Chris |d 1986- |e Verfasser |0 (DE-588)142671304 |4 aut | |
245 | 1 | 0 | |a Applied network security monitoring |b collection, detection, and analysis |c Chris Sanders, Jason Smith |
264 | 1 | |a Amsterdam |b Syngress |c 2014 | |
300 | |a 1 Online-Ressource (XXIV, 472 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Smith, Jason McC. |e Sonstige |0 (DE-588)1023417766 |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124172081 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD_Kauf | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737221 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124172081 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124172081 |l FUBA1 |p ZDB-33-ESD |q ZDB-33-ESD 2017 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152877401243648 |
---|---|
any_adam_object | |
author | Sanders, Chris 1986- |
author_GND | (DE-588)142671304 (DE-588)1023417766 |
author_facet | Sanders, Chris 1986- |
author_role | aut |
author_sort | Sanders, Chris 1986- |
author_variant | c s cs |
building | Verbundindex |
bvnumber | BV042300229 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn865332035 (OCoLC)865332035 (DE-599)BVBBV042300229 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02766nmm a2200529zc 4500</leader><controlfield tag="001">BV042300229</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210114 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124172081</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-417208-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124172083</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-417208-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124172166</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-417216-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124172164</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-417216-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn865332035</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)865332035</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300229</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sanders, Chris</subfield><subfield code="d">1986-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)142671304</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied network security monitoring</subfield><subfield code="b">collection, detection, and analysis</subfield><subfield code="c">Chris Sanders, Jason Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIV, 472 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Jason McC.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1023417766</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124172081</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD_Kauf</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737221</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124172081</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124172081</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">ZDB-33-ESD 2017</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042300229 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:17:42Z |
institution | BVB |
isbn | 9780124172081 0124172083 9780124172166 0124172164 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737221 |
oclc_num | 865332035 |
open_access_boolean | |
owner | DE-1046 DE-860 DE-188 |
owner_facet | DE-1046 DE-860 DE-188 |
physical | 1 Online-Ressource (XXIV, 472 S.) Ill., graph. Darst. |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD_Kauf ZDB-33-ESD FLA_PDA_ESD_Kauf ZDB-33-ESD ZDB-33-ESD 2017 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Sanders, Chris 1986- Verfasser (DE-588)142671304 aut Applied network security monitoring collection, detection, and analysis Chris Sanders, Jason Smith Amsterdam Syngress 2014 1 Online-Ressource (XXIV, 472 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Includes index Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh Computer networks / Security measures fast Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Smith, Jason McC. Sonstige (DE-588)1023417766 oth http://www.sciencedirect.com/science/book/9780124172081 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Sanders, Chris 1986- Applied network security monitoring collection, detection, and analysis COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh Computer networks / Security measures fast Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 |
title | Applied network security monitoring collection, detection, and analysis |
title_auth | Applied network security monitoring collection, detection, and analysis |
title_exact_search | Applied network security monitoring collection, detection, and analysis |
title_full | Applied network security monitoring collection, detection, and analysis Chris Sanders, Jason Smith |
title_fullStr | Applied network security monitoring collection, detection, and analysis Chris Sanders, Jason Smith |
title_full_unstemmed | Applied network security monitoring collection, detection, and analysis Chris Sanders, Jason Smith |
title_short | Applied network security monitoring |
title_sort | applied network security monitoring collection detection and analysis |
title_sub | collection, detection, and analysis |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh Computer networks / Security measures fast Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security Computer networks / Security measures Computer networks Security measures Rechnernetz Computersicherheit |
url | http://www.sciencedirect.com/science/book/9780124172081 |
work_keys_str_mv | AT sanderschris appliednetworksecuritymonitoringcollectiondetectionandanalysis AT smithjasonmcc appliednetworksecuritymonitoringcollectiondetectionandanalysis |