Applied Network Security Monitoring
J**N
Great book, highly recommended, a little long winded
The good:Applied NSM is a good book to read to learn about this topic. The author knows his stuff, and he's a pretty good teacher. Technical terms are defined before they're used, so you won't get lost. Everything is approached step-by-step, you won't run into the Draw An Owl Meme (google it) problem. Also the text is comprehensive, important topics are not left out.Who the book is written for:I'm a network administrator with over a decade of experience, I manage a decent sized network by myself, and wanted more knowledge about this area of network security. The book is more aimed at, "I have a beginners level knowledge of networks and I want to get hired somewhere where my job title is "Network Security Analyst". So the explanations are woven with the thread of a team in mind, but not in a way that detracts from your ability to learn if you're a lone wolf.The bad:I wish I could give the book 4.5 stars. The only problem I ran into is that for my taste, which is borne out of decades of reading technical documentation, the author is a bit long winded. It's not terse enough. Explanations that could be offered in one short sentence are drawn out into a paragraph. I suppose this is good if you're a complete beginner, but it made the text a big of a slog for me, and I found myself skipping first paragraphs and then pages.For example, suppose I wanted to communicate to you this brief and technical point: "The lsof command prints a list of open files, the -i argument lists network connections." The author would render that into this:"Various commands are able to display the current status of the computer. From time to time, users may want the ability to view which files on the computer are open and which files are not. Fortunately, the computer provides a tool that is able to do this. If you want to view open files on the computer, for example, you can use the lsof command, which is typed into your terminal. The lsof command provides various options as well in order to change its output. For example, -i is one of the available options. -i allows lsof to view the activity of the network interface in the form of active and listening connections."Overall, though, if you're a beginner and you want knowledge on this topic, this book will give it to you.
D**I
Written by Analysts for Analysts.
Here's what you need to know about Applied NSM.1. It's an amazingly easy read.Those of us who have ever been forced into digesting anything ever published by Cisco Press know easy to read textbooks are diamonds in the rough. It's clear the authors of Applied NSM went to great lengths to be as technically thorough as possible while maintaining an easy, entertaining and conversational tone throughout the book. It's the anti "Makes Me Want To Bash My Face Into My Desk Just To Stay Awake" book.2. The right tool for the job but...The goal of any analyst is simple but crucial, find evil by any means necessary. To that end you need better weapons than your adversary. In this book Security Onion is your arsenal and the authors perform a deep dive into all wonderful toys Security Onion has to offer. The tools listed within the pages of this book are your ticket to a better way to find the badness lurking on your clients network. That being said...3. ...tools alone will not save you and the authors know it.Of all the weapons at your disposal in the never-ending hunt for evil, unequivocally the most important is that big spongy thing between your ears. This book isn't just a stack of man pages with a fancy cover thrown on, it provides valuable insight and guidance to aid your own unique thought process and hunting style. On that topic, a special note...4. Get your mind right.Chapter 15 "The Analysis Process" should be required reading for both every newbie working in a SOC and every jaded veteran. This chapter could be it's own book and if I have any complaint about Applied NSM it's that this chapter wasn't long enough for me. It's so absolutely crucial I recommend you read it first, then read it again. If you buy the book for no other reason, buy it for Chapter 15.So that's it, whether you're a n00b looking to find his footing in this industry or a battle tested warrior looking for new ways to catch the bad guys, Applied Network Security Monitoring is an absolute must have. Good hunting!
R**S
Great book on Network Security Monitoring
Disclaimers:I’m a long time NSM practitioner and I work with Smith & Bianco.Chris was gracious enough to provide me with a PDF copy of the book for review.- - - -Applied NSM is a powerhouse of practitioner knowledge. Divided into three primary sections (Collection, Detection, & Analysis) ANSM focuses on the key staples necessary for establishing a successful NSM program and how to get up and running.The book weighs in at an impressive 465 pages (including appendixes). However, depending on the readers familiarity with NSM and exposure to other related works on the subject, there could be some overlap.The areas I found most valuable that contributed new concepts to my “NSM library" included:Chapter 2’s discussion on the Applied Collection FrameworkChapter 4’s coverage of SiLK for analysis of flow dataChapter 6’s coverage of LogStash and KibanaChapter 10’s coverage on BroChapter 11’s coverage on Anomaly based detection via SiLK toolsAppendix 3 makes for a handy desk side reference if you work with raw packet captures on a daily basis.For these sections alone, ANSM makes it well worth the purchase and addition to your collection. Speaking of which, all of the proceeds from this book go to several charities, and after having initially reviewed it for free, I still decided to purchase a copy on Kindle to have as a desk side reference and support such great causes.Great job guys!
K**R
Five Stars
Just great.
J**A
The book gives a very clear overview of Network Security ...
The book gives a very clear overview of Network Security Monitoring and the various tools that are available. The author gives a lot of tips
A**S
Excellent book
Would suggest this book to anyone(from junior to advanced level) interested in Network Analysis, SOCs and IDS/SIEM/MSS(P) open source tools.
A**R
useless, Why can't you supply CD ROM with eBOOK ...
Not Relevant, NO CD ROM, useless, Why can't you supply CD ROM with eBOOK in it ??? Waste of Money and Time.
Trustpilot
Hace 1 día
Hace 1 semana