Applied network security monitoring : collection, detection, and analysis
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9780124172081
- 005.8 SAN/A
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
![]() |
IIIT Kottayam Central Library Reference | 005.8 SAN/A (Browse shelf(Opens below)) | Not for loan | 2519 | ||||
![]() |
IIIT Kottayam Central Library General Stacks | 005.8 SAN/A;1 (Browse shelf(Opens below)) | 1 | Available | 2520 | |||
![]() |
IIIT Kottayam Central Library General Stacks | 005.8 SAN/A;2 (Browse shelf(Opens below)) | 2 | Available | 2521 |
Includes bibliographical references and index.
Machine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM .
There are no comments on this title.