| 000 | 01517cam a2200265 i 4500 | ||
|---|---|---|---|
| 001 | 32376 | ||
| 005 | 20230423231424.0 | ||
| 008 | 140910s2014 ne a b 001 0 eng | ||
| 020 | _a9780124172081 (paperback) | ||
| 049 | _bPITLIB | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bS268 |
| 100 | 1 |
_aSanders, Chris, _d1986- _eauthor _941988 |
|
| 245 | 1 | 0 |
_aApplied network security monitoring : _bcollection, detection, and analysis / _cChris Sanders, Jason Smith ; David J. Bianco, technical editor _h[book] |
| 260 | 1 |
_aBoston : _aBoston : _bSyngress, an imprint of Elsevier, _c[2014]. _941949 |
|
| 300 |
_axxiv, 472 pages : _billustrations |
||
| 449 | 0 | _a•u005– New Arrivals- Sep. 2014 | |
| 504 | _aIncludes bibliographical references and index | ||
| 505 | 8 | _aMachine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM | |
| 650 | 4 |
_aComputer security _923769 |
|
| 650 | 4 |
_aComputer networks _xSecurity measures _95919 |
|
| 650 | 0 |
_aOpen source intelligence _941989 |
|
| 700 | 1 |
_aSmith, Jason _c(Adjunct associate professor), _eauthor _941990 |
|
| 942 | _cBK | ||
| 988 | _c32376 | ||
| 999 |
_c32376 _d32376 |
||