Jumat, 05 Agustus 2011

[W946.Ebook] Get Free Ebook Security Monitoring, by Chris Fry, Martin Nystrom

Get Free Ebook Security Monitoring, by Chris Fry, Martin Nystrom

The means to get this publication Security Monitoring, By Chris Fry, Martin Nystrom is very easy. You might not go for some places and spend the moment to only find guide Security Monitoring, By Chris Fry, Martin Nystrom Actually, you could not always get the book as you're willing. However right here, only by search and find Security Monitoring, By Chris Fry, Martin Nystrom, you can get the listings of the books that you truly expect. Sometimes, there are lots of books that are revealed. Those books naturally will impress you as this Security Monitoring, By Chris Fry, Martin Nystrom compilation.

Security Monitoring, by Chris Fry, Martin Nystrom

Security Monitoring, by Chris Fry, Martin Nystrom



Security Monitoring, by Chris Fry, Martin Nystrom

Get Free Ebook Security Monitoring, by Chris Fry, Martin Nystrom

Why must choose the inconvenience one if there is easy? Obtain the profit by acquiring guide Security Monitoring, By Chris Fry, Martin Nystrom below. You will certainly obtain various means to make a deal and obtain the book Security Monitoring, By Chris Fry, Martin Nystrom As recognized, nowadays. Soft documents of guides Security Monitoring, By Chris Fry, Martin Nystrom come to be very popular amongst the readers. Are you among them? And below, we are providing you the brand-new compilation of ours, the Security Monitoring, By Chris Fry, Martin Nystrom.

This is why we recommend you to consistently visit this page when you require such book Security Monitoring, By Chris Fry, Martin Nystrom, every book. By online, you could not getting the book establishment in your city. By this online library, you could discover guide that you truly intend to review after for very long time. This Security Monitoring, By Chris Fry, Martin Nystrom, as one of the suggested readings, has the tendency to be in soft data, as all of book collections right here. So, you could likewise not await few days later on to get as well as review the book Security Monitoring, By Chris Fry, Martin Nystrom.

The soft data suggests that you should go to the link for downloading and then conserve Security Monitoring, By Chris Fry, Martin Nystrom You have actually possessed the book to check out, you have actually postured this Security Monitoring, By Chris Fry, Martin Nystrom It is not difficult as going to the book establishments, is it? After getting this short description, hopefully you can download and install one as well as begin to check out Security Monitoring, By Chris Fry, Martin Nystrom This book is really simple to check out whenever you have the leisure time.

It's no any type of faults when others with their phone on their hand, and also you're as well. The difference may last on the material to open Security Monitoring, By Chris Fry, Martin Nystrom When others open the phone for chatting as well as speaking all things, you can in some cases open and also read the soft documents of the Security Monitoring, By Chris Fry, Martin Nystrom Of course, it's unless your phone is readily available. You could also make or save it in your laptop computer or computer that alleviates you to check out Security Monitoring, By Chris Fry, Martin Nystrom.

Security Monitoring, by Chris Fry, Martin Nystrom

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.

Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. These steps will help you:

  • Develop Policies: define rules, regulations, and monitoring criteria
  • Know Your Network: build knowledge of your infrastructure with network telemetry
  • Select Your Targets: define the subset of infrastructure to be monitored
  • Choose Event Sources: identify event types needed to discover policy violations
  • Feed and Tune: collect data, generate alerts, and tune systems using contextual information
  • Maintain Dependable Event Sources: prevent critical gaps in collecting and monitoring events

Security Monitoring illustrates these steps with detailed examples that will help you learn to select and deploy the best techniques for monitoring your own enterprise network.

  • Sales Rank: #1194034 in Books
  • Brand: Brand: O'Reilly Media
  • Published on: 2009-02-26
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.19" h x .55" w x 7.00" l, .73 pounds
  • Binding: Paperback
  • 246 pages
Features
  • Used Book in Good Condition

About the Author

Chris Fry has been a member of the Computer Security Incident Response Team (CSIRT) at Cisco Systems, Inc for 5 years, focusing on deployment of intrusion detection, network monitoring tools, and incident investigation. He began his career at Cisco in 1997 as an IT analyst, supporting Cisco's production services. His four years as a Network Engineer in Cisco IT's internal network support organization give him valuable knowledge about and unique insight into monitoring production enterprise networks. Chris holds a BA in Corporate Financial Analysis and an MS in Information and Communication Sciences from Ball State University.

Martin Nystrom is an InfoSec Investigations Manager for the Computer Security Incident Response Team (CSIRT) at Cisco Systems. He leads the global security monitoring team and provides guidance for incident response and security initiatives. Prior to joining Cisco's CSIRT, he was responsible for designing and consulting on secure architectures for IT projects. Martin worked as an IT architect and a Java programmer for 12 years prior, where he built his experience in the pharmaceutical and computer industries. He received a bachelor's degree from Iowa State University in 1990, a master's degree from NC State University in 2003, and his CISSP certification in 2004.

Most helpful customer reviews

15 of 17 people found the following review helpful.
Useful for the more advanced reader
By calvinnme
This book is not an introduction to network, server, or database administration. Neither is it an introduction to security tools or techniques. You need to have a foundational understanding of these areas and seek to build on them through specialization of your base skills. If you need a more introductory book I highly recommend The Tao of Network Security Monitoring: Beyond Intrusion Detection. This book attempts to take you deeper into your network, guiding you to identify the more sensitive, important parts of the network for focused monitoring. The first chapter is just an overview chapter and introduces the fictitious company used throughout the book, Blanco Wireless. Like most tech books, the good stuff starts in chapter two.

The second chapter discusses the wide variety of approaches for selecting the policies to monitor. It then discusses the the environment in which these policies are to be applied. Chapter three explores two primary methods of learning about a network: network taxonomy and network telemetry. Chapter four provides a third and final foundation, guiding you to select broad targets on which to focus your monitoring. Deep, proactive security monitoring is overwhelming and unproductive if it isn't targeted to specific systems. By selecting monitoring targets, you can narrow your focus to the most critical systems, making the most of your security monitoring equipment and staff.

Once you've worked through the steps of defining security policies, you know your network, and you've selected your targets, you can build on that foundation by choosing your event sources. Chapter 5 provides an overview of the various device types and their event sources, how you can collect them, and how you can inspect them for security policy violations. The various choices available are collected into a subset of the best event sources to help you choose the appropriate sources quickly, without becoming overwhelmed in the sea of possibilities. Chapter 6 provides guidance on how you can carefully configure systems that fit your infrastructure, and then tune them so you can detect the real security events.Chapter 7 aims to professionalize your monitoring, preventing gaps that could allow an intrusion to succeed without notice. With these finishing touches in place, you should be able to monitor your systems with confidence.

Chapter 8 is a concluding chapter. It gives examples where monitoring ideals haven't always aligned with practical experience, including the consequences of those deviations from standard rules. It gives the results of two case studies, including how the organizations deployed targeted monitoring. It concludes by stripping down the advice of the book to bare-minimum tasks for each step, leaving you with a checklist to start your own targeted monitoring.

Appendix A gives detailed information on setting up and running a NetFlow collector based on OSU flow-tools, followed by some simple commands to enable NetFlow generation from a Cisco IOS router. OSU flow-tools is a set of open source NetFlow collection utilities.

This book is a good combination of tools, calculations, and advice on organizing your thoughts and strategy for the more advanced user who is familiar with networks and network security. I highly recommend it for that type of reader.

7 of 7 people found the following review helpful.
Solid Practical Advice
By Parentsof4
There is a lot of very practical information packed into this little book, no fluff or filler anywhere to be found. It will defiantly add value to any Network Security Monitoring implementation. This is a perfect book for a Network or System Engineer crossing over into Security. The only complaint is that it is way to pricey for such a small book printed on what feels like cheap newsprint.

4 of 4 people found the following review helpful.
Real world view...
By RobR
This book is a quick read "how-to" book to take your company to the next level. This is a real reality check written with an assumption that the reader is already familiar with networks and security. This book attempts to drive the value home with case studies, maintenance recommendations (yes, you do have to maintain the beast) and scripts to get started, and collected best practices. This is one of the books that get dog-eared and notes in the margin quickly.

See all 10 customer reviews...

Security Monitoring, by Chris Fry, Martin Nystrom PDF
Security Monitoring, by Chris Fry, Martin Nystrom EPub
Security Monitoring, by Chris Fry, Martin Nystrom Doc
Security Monitoring, by Chris Fry, Martin Nystrom iBooks
Security Monitoring, by Chris Fry, Martin Nystrom rtf
Security Monitoring, by Chris Fry, Martin Nystrom Mobipocket
Security Monitoring, by Chris Fry, Martin Nystrom Kindle

Security Monitoring, by Chris Fry, Martin Nystrom PDF

Security Monitoring, by Chris Fry, Martin Nystrom PDF

Security Monitoring, by Chris Fry, Martin Nystrom PDF
Security Monitoring, by Chris Fry, Martin Nystrom PDF

Tidak ada komentar:

Posting Komentar