Applied network security monitoring : collection, detection, and analysis /
This book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examples
Main Authors: | , |
---|---|
Format: | |
Language: | eng |
Published: |
Amsterdam ; Boston : Syngress, an imprint of Elsevier,
2014
|
Subjects: |
_version_ | 1826458169142935552 |
---|---|
author | Sanders, Chris, 1986- Smith, Jason (Adjunct associate professor), author |
author_facet | Sanders, Chris, 1986- Smith, Jason (Adjunct associate professor), author |
author_sort | Sanders, Chris, 1986- |
collection | OCEAN |
description | This book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examples |
first_indexed | 2024-03-05T13:47:48Z |
format | |
id | KOHA-OAI-TEST:505869 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T13:47:48Z |
publishDate | 2014 |
publisher | Amsterdam ; Boston : Syngress, an imprint of Elsevier, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5058692020-12-19T17:18:44ZApplied network security monitoring : collection, detection, and analysis / Sanders, Chris, 1986- Smith, Jason (Adjunct associate professor), author Amsterdam ; Boston : Syngress, an imprint of Elsevier,2014engThis book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examplesIncludes bibliographical references and indexThis book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examplesPSZJBLComputer securityComputer networksOpen source intelligenceURN:ISBN:9780124172081 (pbk.) |
spellingShingle | Computer security Computer networks Open source intelligence Sanders, Chris, 1986- Smith, Jason (Adjunct associate professor), author Applied network security monitoring : collection, detection, and analysis / |
title | Applied network security monitoring : collection, detection, and analysis / |
title_full | Applied network security monitoring : collection, detection, and analysis / |
title_fullStr | Applied network security monitoring : collection, detection, and analysis / |
title_full_unstemmed | Applied network security monitoring : collection, detection, and analysis / |
title_short | Applied network security monitoring : collection, detection, and analysis / |
title_sort | applied network security monitoring collection detection and analysis |
topic | Computer security Computer networks Open source intelligence |
work_keys_str_mv | AT sanderschris1986 appliednetworksecuritymonitoringcollectiondetectionandanalysis AT smithjasonadjunctassociateprofessorauthor appliednetworksecuritymonitoringcollectiondetectionandanalysis |