000 01474aaa a2200253 i 4500
999 _c10297
_d10297
005 20221220140550.0
008 220803s2014 xxua|||| |||| 00| 0 eng d
020 _a9780124172081
040 _aUISEK-EC
_bspa
_erda
100 1 _aSanders, Chris
_eaut
_912899
245 1 0 _aApplied network security monitoring:
_bcollection, detection, and analysis /
_cChris Sanders, Jason Smith
264 _aMassachusetts:
_bElsevier,
_c2014
300 _a496 páginas:
_bilustraciones;
_c27 cm
336 _atxt
337 _2rdamedia
_an
338 _2rdacarrier
_anc
505 _aThe practice of applied network security monitoring - Planning data collection - The sensor platform - Session data - Full packet capture data - Packet string data - Detection mechanisms, indicators of compromise, and signatures - Reputation-based detection - Signature-based detection with snort and suricata - The bro platform - Anomaly-based detection with statistical data - Using canary honeypots for detection - Packet analysis - Friendly and threat intelligence - The analysis process - Security onion control scripts - Important security onion files and directories - Packet headers - Decimal / Hex / ASCII Conversion Chart.
526 _aMaestria en ciberseguridad
082 0 4 _a005.8
_bS215ap 2014
650 1 7 _2lemb
_910580
_aSeguridad de la información
650 2 7 _2unescot
_91079
_aBases de datos
_xSeguridad
650 2 0 _94682
_aSeguridad informática
942 _cBK