- Paperback: 376 pages
- Publisher: No Starch Press; 1 edition (July 15, 2013)
- Language: English
- ISBN-10: 1593275099
- ISBN-13: 978-1593275099
- Product Dimensions: 7.1 x 1.1 x 9.2 inches
- Shipping Weight: 1.8 pounds (View shipping rates and policies)
- Average Customer Review: 47 customer reviews
Amazon Best Sellers Rank:
#136,956 in Books (See Top 100 in Books)
- #10 in Books > Computers & Technology > Networking & Cloud Computing > Network Administration > Disaster & Recovery
- #53 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > Networks
- #124 in Books > Computers & Technology > Networking & Cloud Computing > Network Security
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
The Practice of Network Security Monitoring: Understanding Incident Detection and Response 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
All Books, All the Time
Read author interviews, book reviews, editors picks, and more at the Amazon Book Review. Read it now
Frequently bought together
Customers who bought this item also bought
About the Author
Richard Bejtlich is Chief Security Strategist at FireEye, and was formerly Chief Security Officer at Mandiant. He also served as Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). He is a graduate of Harvard University and the United States Air Force Academy. His previous works include The Tao of Network Security Monitoring, Extrusion Detection, and Real Digital Forensics (all from Addison-Wesley). He blogs (http://taosecurity.blogspot.com/) and writes on Twitter as @taosecurity.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Some of the tools demonstrated have a user interface, but most of the operating system defense requires command line operation so be prepared to do some heavy screen reading. Also, a large amount of filtering of log files may be required to see a pattern in the attacks. Be serious about this or be prepared to be a victim. The current state of network protection doesn't have a middle ground.
Best technical book I've ever read.