| 000 | 01535cam a22002895a 4500 | ||
|---|---|---|---|
| 001 | 17961159 | ||
| 005 | 20201128021441.0 | ||
| 008 | 131203t2014 maua frb 001 0 eng d | ||
| 020 | _a9780124172081 (paperback) | ||
| 040 |
_aDLC _beng _cDLC _dDLC _dEG-ScBUE |
||
| 082 | 0 | 4 |
_a005.8 _222 _bSAN |
| 100 | 1 |
_aSanders, Chris, _d1986- _939240 |
|
| 245 | 1 | 0 |
_aApplied network security monitoring : _bcollection, detection, and analysis / _cChris Sanders, Jason Smith ; editor David J. Bianco |
| 260 |
_aWaltham : _bSyngress / Elsevier, _cc.2014. |
||
| 300 |
_axxiv, 472 p. : _bill. ; _c24 cm. |
||
| 500 | _aIndex : p. 467-472. | ||
| 504 | _aIncludes bibliographical references. | ||
| 505 | 8 | _aMachine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM . | |
| 650 | 7 |
_aComputer security. _2BUEsh _92637 |
|
| 650 | 7 |
_aComputer networks _xSecurity measures. _2BUEsh _92634 |
|
| 650 | 7 |
_aOpen source intelligence. _2BUEsh _939241 |
|
| 651 | _2BUEsh | ||
| 653 |
_bCOMSCI _cJuly2015 _cFebruary2016 |
||
| 700 | 1 | _aSmith, Jason | |
| 700 | 1 |
_aBianco, David J., _eeditor. _937835 |
|
| 942 | _2ddc | ||
| 999 |
_c20386 _d20358 |
||