The Practice of Network Security Monitoring: Understanding Incident Detection and Response 1st Edition
by
Richard Bejtlich
(Author)
|
Richard Bejtlich
(Author)
Find all the books, read about the author, and more.
See search results for this author
|
ISBN-13:
978-1593275099
ISBN-10:
1593275099
Why is ISBN important?
ISBN
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Use the Amazon App to scan ISBNs and compare prices.
Add to book club
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club?
Learn more
Join or create book clubs
Choose books together
Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.
You'll learn how to:
–Determine where to deploy NSM platforms, and size them for the monitored networks
–Deploy stand-alone or distributed NSM installations
–Use command line and graphical packet analysis tools, and NSM consoles
–Interpret network evidence from server-side and client-side intrusions
–Integrate threat intelligence into NSM software to identify sophisticated adversaries
There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.
You'll learn how to:
–Determine where to deploy NSM platforms, and size them for the monitored networks
–Deploy stand-alone or distributed NSM installations
–Use command line and graphical packet analysis tools, and NSM consoles
–Interpret network evidence from server-side and client-side intrusions
–Integrate threat intelligence into NSM software to identify sophisticated adversaries
There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
Frequently bought together
Customers who viewed this item also viewed
Page 1 of 1 Start overPage 1 of 1
Editorial Reviews
About the Author
Richard Bejtlich is Chief Security Strategist at FireEye, and was formerly Chief Security Officer at Mandiant. He also served as Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). He is a graduate of Harvard University and the United States Air Force Academy. His previous works include The Tao of Network Security Monitoring, Extrusion Detection, and Real Digital Forensics (all from Addison-Wesley). He blogs (http://taosecurity.blogspot.com/) and writes on Twitter as @taosecurity.
Product details
- Publisher : No Starch Press; 1st edition (July 15, 2013)
- Language : English
- Paperback : 376 pages
- ISBN-10 : 1593275099
- ISBN-13 : 978-1593275099
- Item Weight : 1.8 pounds
- Dimensions : 7 x 0.92 x 9.25 inches
-
Best Sellers Rank:
#455,894 in Books (See Top 100 in Books)
- #42 in Network Disaster & Recovery Administration
- #142 in Computer Networks
- #348 in Computer Networking (Books)
- Customer Reviews:
Start reading The Practice of Network Security Monitoring on your Kindle in under a minute.
Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.
Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.
Audible Holiday Deal
Save 46% on your first 4 months. Get this deal
About the author
Follow authors to get new release updates, plus improved recommendations.

Mr. Bejtlich has been an author for two decades. Please see www.linkedin.com/in/richardbejtlich/ for details on Mr. Bejtlich's biography. As an Amazon Associate I earn from qualifying purchases.
Read moreRead less
Customer reviews
4.7 out of 5 stars
4.7 out of 5
123 global ratings
How are ratings calculated?
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzes reviews to verify trustworthiness.
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Reviewed in the United States on May 6, 2021
Verified Purchase
This book takes what can be a dry topic to some and adds punch and power to explanation and gives you a basis to understand what to look for. Good as a starting point to not be lazy and start understanding threat hunting.
One person found this helpful
Report abuse
Reviewed in the United States on October 15, 2015
Verified Purchase
I'm new to network security monitoring, and this is an excellent guide. I love that they share an open source option, with just about a step by step guide to implement, after a decent breakdown of the process and technology of packets.
7 people found this helpful
Report abuse
Reviewed in the United States on March 20, 2014
Verified Purchase
The "Cybersecurity and Cyberwar" book told you what was going on and how to protect yourself in general. This book gives you the ninja skills to actually seal your network borders and measure the level of the threat. Various methods and opensource tools are used to build a high level of protection for the reader's system.
Some of the tools demonstrated have a user interface, but most of the operating system defense requires command line operation so be prepared to do some heavy screen reading. Also, a large amount of filtering of log files may be required to see a pattern in the attacks. Be serious about this or be prepared to be a victim. The current state of network protection doesn't have a middle ground.
Some of the tools demonstrated have a user interface, but most of the operating system defense requires command line operation so be prepared to do some heavy screen reading. Also, a large amount of filtering of log files may be required to see a pattern in the attacks. Be serious about this or be prepared to be a victim. The current state of network protection doesn't have a middle ground.
8 people found this helpful
Report abuse
Reviewed in the United States on January 6, 2014
Verified Purchase
This book has a lot of great content regarding Network Security Monitoring in general, but is especially helpful if you are rolling out Security Onion. There are a lot of videos and online tutorials out there but I like to be able to put my hands on it and have it all in one place. It's not necessarily for beginners, but readers in all stages of professional development will benefit from the content. It is well written and presented in a way that flows nicely. Lots of helpful tips and insight.
6 people found this helpful
Report abuse
Reviewed in the United States on September 3, 2015
Verified Purchase
As we enter the murky age of Internet of Things (or "Internet of Insecure Things", "Internet of Evil Things", "Botnet of Things", take your pick) monitoring your home network has to become a common skill. Although by no means confined to application in home environments, The Practice of Network Security Monitoring does allow a modestly technically adept user to do just that. This book walks you through understanding the concepts, installing the needed software, configuring network monitoring components, and using some of the many free solutions for detecting unwanted or malicious traffic.
For those who want to apply this work at home, allow me to make a few suggestions about corollary purchases you may need to make. I recommend dedicating a desktop or tower computer to the task of server. It doesn't need an especially powerful CPU, but it should have a lot of RAM, at least 8 GB. Purchase your RAM with a view to exanding; using 8GB as an example, don't buy 4 2GB sticks, but rather 2 4GB sticks. Later you could by 2 x 4GB or 2 x 8GB sticks to upgrade memory. You will also need at least 1 extra NIC (Network Interface Card), which will be in permanent 'listen only' (aka "promiscuous") mode. You will be using the free Security Onion solution, running on the free Ubuntu 12.04 Linux, so you can skip buying a license for Windows if you purchase everything from scratch. Finally you will need at least one network device that can duplicate traffic. The book will explain the difference between spanning (or 'mirroring') and tapping, but unless you are a sufficiently knowledgeable about networking, you will probably do well to buy a Dualcomm DCSW-1005 USB Powered 5-Port 10/100 Fast Ethernet Switch TAP (Port Mirroring) - it is drop dead simple to install and use.
You really can do this - enjoy!
For those who want to apply this work at home, allow me to make a few suggestions about corollary purchases you may need to make. I recommend dedicating a desktop or tower computer to the task of server. It doesn't need an especially powerful CPU, but it should have a lot of RAM, at least 8 GB. Purchase your RAM with a view to exanding; using 8GB as an example, don't buy 4 2GB sticks, but rather 2 4GB sticks. Later you could by 2 x 4GB or 2 x 8GB sticks to upgrade memory. You will also need at least 1 extra NIC (Network Interface Card), which will be in permanent 'listen only' (aka "promiscuous") mode. You will be using the free Security Onion solution, running on the free Ubuntu 12.04 Linux, so you can skip buying a license for Windows if you purchase everything from scratch. Finally you will need at least one network device that can duplicate traffic. The book will explain the difference between spanning (or 'mirroring') and tapping, but unless you are a sufficiently knowledgeable about networking, you will probably do well to buy a Dualcomm DCSW-1005 USB Powered 5-Port 10/100 Fast Ethernet Switch TAP (Port Mirroring) - it is drop dead simple to install and use.
You really can do this - enjoy!
10 people found this helpful
Report abuse
Reviewed in the United States on February 28, 2015
Verified Purchase
Book in perfect condition, of course it was the contents that I got it for and that is excellent. Overall very pleased with the book and contents if I may be redundundant.
One person found this helpful
Report abuse
Reviewed in the United States on May 10, 2014
Verified Purchase
An easy to understand book. Not too heavy w/facts, but it's a great way to get some experience with Wireshark.
One person found this helpful
Report abuse
Reviewed in the United States on November 9, 2015
Verified Purchase
Actually I've read it from a pirated-PDF but the book was so well and couldn't resist to buy it originally and put it into my book shelf. Thanks Richard (and of course Doug)
Best technical book I've ever read.
Best technical book I've ever read.
8 people found this helpful
Report abuse
Top reviews from other countries
Rene Thorup
3.0 out of 5 stars
Not like the good old NSM "bibles"
Reviewed in the United Kingdom on June 16, 2014Verified Purchase
I have read, and own, all Richards books. They have defined the art of Network Forensic and I have used them a lot in my MSc project. However, this book was a bit disappointing as it is basically just a "manual" to the security onion distro.
For that purpose it is excellent and still surprised me with cool hints, I now use everyday! But if you look for a book on NSM go for his older books like "The TAO of NSM" and "Extrusion Detection".
For that purpose it is excellent and still surprised me with cool hints, I now use everyday! But if you look for a book on NSM go for his older books like "The TAO of NSM" and "Extrusion Detection".
2 people found this helpful
Report abuse
Mr Adrian C Hallett
4.0 out of 5 stars
but content is good so far
Reviewed in the United Kingdom on February 3, 2016Verified Purchase
Still reading, but content is good so far. I know most of this stuff is on the net and more up to date perhaps, but this brings it together, and serves my need right now.
Matt
3.0 out of 5 stars
It's a bit basic for anyone that has a knowledge ...
Reviewed in the United Kingdom on July 17, 2014Verified Purchase
It's a bit basic for anyone that has a knowledge of InfoSec or IPS/IDS. Not much in the way of troubleshooting for Security Onion. The steps were followed but it didn't work exactly as described and was left scratching around to find out why.
2 people found this helpful
Report abuse
Stephen
4.0 out of 5 stars
Four Stars
Reviewed in the United Kingdom on September 25, 2014Verified Purchase
Mostly good on the kindle not such a good read.
Amazon Customer
5.0 out of 5 stars
Five Stars
Reviewed in the United Kingdom on June 3, 2016Verified Purchase
Great. Thanks :-)


















