Amazon cover image
Image from Amazon.com

Practical network security monitoring : using free software / Elizabeth Graham

By: Material type: TextTextPublication details: [Place of publication not identifed] : [publisher not identified], c2020Description: 332 pages : illustrations ; 23 cmISBN:
  • 9781098352554
Subject(s): LOC classification:
  • TK 5105.5 .G73 2020
Contents:
Part 1. Install and configure security onion -- Part 2. Sguil -- Part 3. Packet Capture (PCAP) Analysis -- Part 4. Security Onion Integrations -- Part 5. Visual Analysis Tools -- Par 6.
Summary: This book provides practical exercises to learn how to use free software to identify threats to your network. The practical exercises provide step-by-step instructions allowing you to install, configure, and use the free tools. This book is not intended to be an all-inclusive guide to defending your network and assets, but is intended to provide you with the hands-on experience to analyze your network traffic and determine if traffic is malicious.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Books Books National University - Manila LRC - Main General Circulation Gen. Ed. - CCIT GC TK 5105.5 .G73 2020 (Browse shelf(Opens below)) c.1 Available NULIB000018795

Includes bibliographical references.

Part 1. Install and configure security onion -- Part 2. Sguil -- Part 3. Packet Capture (PCAP) Analysis -- Part 4. Security Onion Integrations -- Part 5. Visual Analysis Tools -- Par 6.

This book provides practical exercises to learn how to use free software to identify threats to your network. The practical exercises provide step-by-step instructions allowing you to install, configure, and use the free tools. This book is not intended to be an all-inclusive guide to defending your network and assets, but is intended to provide you with the hands-on experience to analyze your network traffic and determine if traffic is malicious.

There are no comments on this title.

to post a comment.