free tracker
Categories Unlimited Books

Security Monitoring



Offers six steps to improve the way you monitor vital assets, based on the authors’ years of experience conducting incident response to keep Cisco’s global network secure. This book demonstrates how you can detect damaging security incidents on your global network.New
Mint Condition
Dispatch same day for order received before 12 noon
Guaranteed packaging
No quibbles returns


Security Monitoring

Pub Date : 2009-02-09 | Author : Chris Fry | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9780596555450
ISBN 13 : 0596555458

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security..



Applied Network Security Monitoring

Pub Date : 2013-11-26 | Author : Chris Sanders | Publisher : Elsevier

ISBN 10 : 9780124172166
ISBN 13 : 0124172164

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of rea..


Security Monitoring With Cisco Security Mars

Pub Date : 2007-07-06 | Author : Gary Halleen | Publisher : Pearson Education

ISBN 10 : 0132796775
ISBN 13 : 9780132796774

Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and securit..


The Tao Of Network Security Monitoring

Pub Date : 2004-07-12 | Author : Richard Bejtlich | Publisher : Pearson Education

ISBN 10 : 0132702045
ISBN 13 : 9780132702041

"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you are new to netwo..



Crafting The Infosec Playbook

Pub Date : 2015-05-07 | Author : Jeff Bollinger | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9781491913604
ISBN 13 : 1491913606

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach..


Leave a Reply

Your email address will not be published. Required fields are marked *