000 01074nam a22001937a 4500
020 _a9780124172081
082 0 0 _a005.8
_bSAN/A
100 1 _aSanders, Chris,
245 1 0 _aApplied network security monitoring :
_bcollection, detection, and analysis
260 _aUSA
_bElsevier
_c2014
300 _axxiv, 472p.
_billustrations ;
504 _aIncludes bibliographical references and index.
505 8 _aMachine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM .
650 0 _aComputer security.
650 0 _aComputer networks
650 0 _aOpen source intelligence.
700 1 _aSmith, Jason
942 _cBK
999 _c2461
_d2461