Get Free Ebook Security Monitoring, by Chris Fry, Martin Nystrom
Spending the leisure by reading Security Monitoring, By Chris Fry, Martin Nystrom can supply such great experience even you are only seating on your chair in the office or in your bed. It will not curse your time. This Security Monitoring, By Chris Fry, Martin Nystrom will assist you to have more valuable time while taking rest. It is quite pleasurable when at the noon, with a cup of coffee or tea as well as a publication Security Monitoring, By Chris Fry, Martin Nystrom in your device or computer display. By delighting in the sights around, right here you can start reading.
Security Monitoring, by Chris Fry, Martin Nystrom
Get Free Ebook Security Monitoring, by Chris Fry, Martin Nystrom
Exactly how if your day is started by checking out a book Security Monitoring, By Chris Fry, Martin Nystrom Yet, it is in your gizmo? Everyone will constantly touch and also us their gizmo when getting up as well as in early morning tasks. This is why, we intend you to likewise read a publication Security Monitoring, By Chris Fry, Martin Nystrom If you still confused ways to obtain guide for your device, you can follow the means right here. As below, our company offer Security Monitoring, By Chris Fry, Martin Nystrom in this web site.
If you ally require such a referred Security Monitoring, By Chris Fry, Martin Nystrom publication that will certainly provide you value, obtain the best seller from us now from numerous preferred authors. If you wish to enjoyable books, many stories, story, jokes, and also more fictions compilations are additionally released, from best seller to one of the most recent released. You may not be puzzled to appreciate all book collections Security Monitoring, By Chris Fry, Martin Nystrom that we will certainly supply. It is not regarding the prices. It has to do with just what you require currently. This Security Monitoring, By Chris Fry, Martin Nystrom, as one of the best sellers right here will be one of the right selections to check out.
Finding the ideal Security Monitoring, By Chris Fry, Martin Nystrom book as the right need is sort of lucks to have. To start your day or to end your day at night, this Security Monitoring, By Chris Fry, Martin Nystrom will be proper sufficient. You could merely hunt for the tile below and also you will obtain guide Security Monitoring, By Chris Fry, Martin Nystrom referred. It will not bother you to reduce your valuable time to go with buying book in store. This way, you will additionally invest money to pay for transport as well as various other time invested.
By downloading and install the online Security Monitoring, By Chris Fry, Martin Nystrom book right here, you will certainly obtain some advantages not to go for the book store. Just link to the web and begin to download the web page web link we discuss. Currently, your Security Monitoring, By Chris Fry, Martin Nystrom prepares to delight in reading. This is your time as well as your peacefulness to obtain all that you want from this book Security Monitoring, By Chris Fry, Martin Nystrom
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.
Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. These steps will help you:
- Develop Policies: define rules, regulations, and monitoring criteria
- Know Your Network: build knowledge of your infrastructure with network telemetry
- Select Your Targets: define the subset of infrastructure to be monitored
- Choose Event Sources: identify event types needed to discover policy violations
- Feed and Tune: collect data, generate alerts, and tune systems using contextual information
- Maintain Dependable Event Sources: prevent critical gaps in collecting and monitoring events
Security Monitoring illustrates these steps with detailed examples that will help you learn to select and deploy the best techniques for monitoring your own enterprise network.
- Sales Rank: #1194034 in Books
- Brand: Brand: O'Reilly Media
- Published on: 2009-02-26
- Original language: English
- Number of items: 1
- Dimensions: 9.19" h x .55" w x 7.00" l, .73 pounds
- Binding: Paperback
- 246 pages
- Used Book in Good Condition
About the Author
Chris Fry has been a member of the Computer Security Incident Response Team (CSIRT) at Cisco Systems, Inc for 5 years, focusing on deployment of intrusion detection, network monitoring tools, and incident investigation. He began his career at Cisco in 1997 as an IT analyst, supporting Cisco's production services. His four years as a Network Engineer in Cisco IT's internal network support organization give him valuable knowledge about and unique insight into monitoring production enterprise networks. Chris holds a BA in Corporate Financial Analysis and an MS in Information and Communication Sciences from Ball State University.
Martin Nystrom is an InfoSec Investigations Manager for the Computer Security Incident Response Team (CSIRT) at Cisco Systems. He leads the global security monitoring team and provides guidance for incident response and security initiatives. Prior to joining Cisco's CSIRT, he was responsible for designing and consulting on secure architectures for IT projects. Martin worked as an IT architect and a Java programmer for 12 years prior, where he built his experience in the pharmaceutical and computer industries. He received a bachelor's degree from Iowa State University in 1990, a master's degree from NC State University in 2003, and his CISSP certification in 2004.
Most helpful customer reviews
15 of 17 people found the following review helpful.
Useful for the more advanced reader
By calvinnme
This book is not an introduction to network, server, or database administration. Neither is it an introduction to security tools or techniques. You need to have a foundational understanding of these areas and seek to build on them through specialization of your base skills. If you need a more introductory book I highly recommend The Tao of Network Security Monitoring: Beyond Intrusion Detection. This book attempts to take you deeper into your network, guiding you to identify the more sensitive, important parts of the network for focused monitoring. The first chapter is just an overview chapter and introduces the fictitious company used throughout the book, Blanco Wireless. Like most tech books, the good stuff starts in chapter two.
The second chapter discusses the wide variety of approaches for selecting the policies to monitor. It then discusses the the environment in which these policies are to be applied. Chapter three explores two primary methods of learning about a network: network taxonomy and network telemetry. Chapter four provides a third and final foundation, guiding you to select broad targets on which to focus your monitoring. Deep, proactive security monitoring is overwhelming and unproductive if it isn't targeted to specific systems. By selecting monitoring targets, you can narrow your focus to the most critical systems, making the most of your security monitoring equipment and staff.
Once you've worked through the steps of defining security policies, you know your network, and you've selected your targets, you can build on that foundation by choosing your event sources. Chapter 5 provides an overview of the various device types and their event sources, how you can collect them, and how you can inspect them for security policy violations. The various choices available are collected into a subset of the best event sources to help you choose the appropriate sources quickly, without becoming overwhelmed in the sea of possibilities. Chapter 6 provides guidance on how you can carefully configure systems that fit your infrastructure, and then tune them so you can detect the real security events.Chapter 7 aims to professionalize your monitoring, preventing gaps that could allow an intrusion to succeed without notice. With these finishing touches in place, you should be able to monitor your systems with confidence.
Chapter 8 is a concluding chapter. It gives examples where monitoring ideals haven't always aligned with practical experience, including the consequences of those deviations from standard rules. It gives the results of two case studies, including how the organizations deployed targeted monitoring. It concludes by stripping down the advice of the book to bare-minimum tasks for each step, leaving you with a checklist to start your own targeted monitoring.
Appendix A gives detailed information on setting up and running a NetFlow collector based on OSU flow-tools, followed by some simple commands to enable NetFlow generation from a Cisco IOS router. OSU flow-tools is a set of open source NetFlow collection utilities.
This book is a good combination of tools, calculations, and advice on organizing your thoughts and strategy for the more advanced user who is familiar with networks and network security. I highly recommend it for that type of reader.
7 of 7 people found the following review helpful.
Solid Practical Advice
By Parentsof4
There is a lot of very practical information packed into this little book, no fluff or filler anywhere to be found. It will defiantly add value to any Network Security Monitoring implementation. This is a perfect book for a Network or System Engineer crossing over into Security. The only complaint is that it is way to pricey for such a small book printed on what feels like cheap newsprint.
4 of 4 people found the following review helpful.
Real world view...
By RobR
This book is a quick read "how-to" book to take your company to the next level. This is a real reality check written with an assumption that the reader is already familiar with networks and security. This book attempts to drive the value home with case studies, maintenance recommendations (yes, you do have to maintain the beast) and scripts to get started, and collected best practices. This is one of the books that get dog-eared and notes in the margin quickly.
Security Monitoring, by Chris Fry, Martin Nystrom PDF
Security Monitoring, by Chris Fry, Martin Nystrom EPub
Security Monitoring, by Chris Fry, Martin Nystrom Doc
Security Monitoring, by Chris Fry, Martin Nystrom iBooks
Security Monitoring, by Chris Fry, Martin Nystrom rtf
Security Monitoring, by Chris Fry, Martin Nystrom Mobipocket
Security Monitoring, by Chris Fry, Martin Nystrom Kindle
Tidak ada komentar:
Posting Komentar