Industrial Deals Prime Book Box Men's Summer Sneakers nav_sap_plcc_ascpsc $5 Albums New Moto G6 64 GB | $299.99. Save with Prime Exclusive Phones. Starting at $39.99 Grocery Handmade Personalized Jewelry Book a house cleaner for 2 or more hours on Amazon TheGrandTour TheGrandTour TheGrandTour  Echo All-new Show Mode Charging Dock Kindle Paperwhite GNO Shop now STL18_GNO

Customer Reviews

4.6 out of 5 stars
47


on October 15, 2015
I'm new to network security monitoring, and this is an excellent guide. I love that they share an open source option, with just about a step by step guide to implement, after a decent breakdown of the process and technology of packets.
3 people found this helpful
|0Comment|Report abuse
on January 6, 2014
This book has a lot of great content regarding Network Security Monitoring in general, but is especially helpful if you are rolling out Security Onion. There are a lot of videos and online tutorials out there but I like to be able to put my hands on it and have it all in one place. It's not necessarily for beginners, but readers in all stages of professional development will benefit from the content. It is well written and presented in a way that flows nicely. Lots of helpful tips and insight.
3 people found this helpful
|0Comment|Report abuse
on March 20, 2014
The "Cybersecurity and Cyberwar" book told you what was going on and how to protect yourself in general. This book gives you the ninja skills to actually seal your network borders and measure the level of the threat. Various methods and opensource tools are used to build a high level of protection for the reader's system.

Some of the tools demonstrated have a user interface, but most of the operating system defense requires command line operation so be prepared to do some heavy screen reading. Also, a large amount of filtering of log files may be required to see a pattern in the attacks. Be serious about this or be prepared to be a victim. The current state of network protection doesn't have a middle ground.
5 people found this helpful
|0Comment|Report abuse
on February 28, 2015
Book in perfect condition, of course it was the contents that I got it for and that is excellent. Overall very pleased with the book and contents if I may be redundundant.
One person found this helpful
|0Comment|Report abuse
on September 12, 2015
Essential book for a pentester or security specialist.
|0Comment|Report abuse
on November 9, 2015
Actually I've read it from a pirated-PDF but the book was so well and couldn't resist to buy it originally and put it into my book shelf. Thanks Richard (and of course Doug)

Best technical book I've ever read.
8 people found this helpful
|0Comment|Report abuse
on June 11, 2016
An excellent book full of tools and suggestions on best practices for NSM, a must have.
One person found this helpful
|0Comment|Report abuse
on March 25, 2017
Great books, must read for people who work with NSMs.
One person found this helpful
|0Comment|Report abuse
on April 19, 2015
Good product, as expected.
|0Comment|Report abuse
on February 26, 2015
Item as described.
|0Comment|Report abuse