The Practice of Network Security Monitoring

The Practice of Network Security Monitoring

4.11 - 1251 ratings - Source

Offers information on building, deploying, and running a network security monitoring operation with open source software and vendor-neutral tools.For example, traffic in Example 6-32 to the traffic is likely related to Apple protocols, because Apple owns that ... Doing similar analysis shows Microsoft owns the 157.560.0/ 14 net block, Amazon owns 14, and Verizon owns ... Taking a protocol approach requires looking at the protocols involved, often by deciphering which applications use ... For example, Apple uses port 3544 UDP for its push notification service, and port 16386 UDP for its FaceTime service.

Title:The Practice of Network Security Monitoring
Author: Richard Bejtlich
Publisher:No Starch Press - 2013

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA