Foreword / by Todd Heberlein -- Network Security Monitoring Rationale -- Collecting Network Traffic: Access, Storage, and Management -- Stand-alone NSM Deployment and Installation -- Distributed Deployment -- SO Platform Housekeeping -- Command Line Packet Analysis Tools -- Graphical Packet Analysis Tools -- NSM Consoles -- NSM Operations -- Server-side Compromise -- Client-side Compromise -- Extending SO -- Proxies and Checksums.
0
"Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In this book the author shows you how to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools."--Back cover.