Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Security Monitoring book available from O'Reilly

O'Reilly : 23 April, 2009  (New Product)
Latest addition to the O'Reilly library helps readers to improve network monitoring


How well does your enterprise stand up against today's sophisticated security threats? In Security Monitoring (O'Reilly), security experts Chris Fry and Martin Nystrom from Cisco Systems demonstrate how to detect damaging security incidents on your global network -¯first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. 'We share the challenges you face; we're on the hook for security, and have to prioritize resources to make it happen,' write Nystrom and Fry. They've based their book on their years of experience conducting incident response to keep Cisco's global network secure. 'We like reading authentic books, the ones that don't try to sell us gear or consulting services ¯and we've endeavored to write this book with that angle,' they explain. 'This book aims to share our experience, successes, and failures to improve security monitoring with targeted techniques.' Security Monitoring offers six steps to improve network monitoring, which will help readers: * Develop Policies: define rules, regulations, and monitoring criteria * Know Your Network: build knowledge of your infrastructure with network telemetry * Select Your Targets: define the subset of infrastructure to be monitored * Choose Event Sources: identify event types needed to discover policy violations * Feed and Tune: collect data, generate alerts, and tune systems using contextual information * Maintain Dependable Event Sources: prevent critical gaps in collecting and monitoring events Security Monitoring illustrates these steps with detailed examples designed to help readers learn to select and deploy the best techniques for monitoring their own enterprise networks. This book is from practitioners for practitioners. The authors are approaching the topic of security monitoring from a very practical and hands-on perspective.



Raffael Marty, chief security strategist, Security Visualization Chris Fry a security investigator for Cisco Systems Computer Security Incident Response Team (CSIRT), joined Cisco in 1997 as an IT analyst specializing in production services support. He spent four years as a network engineer within Cisco IT gaining enterprise network knowledge and a unique insight into monitoring production networks Martin Nystrom is a Member of Technical Staff (MTS) for the Computer Security Incident Response Team (CSIRT) at Cisco Systems. He leads the global security monitoring team and provides guidance for incident response and security initiatives. Security Monitoring by Chris Fry, Martin Nystrom - ISBN: 9780596518165, 246 pages, $44.99, £34.50.


Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   Ā© 2012 ProSecurityZone.com
Netgains Logo