A reader asked me to explain cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 differences between two of my books. I decided to write a public response.
If you visit cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365
TaoSecurity Books page, you will see two different types of books. The first type involves books which list me as author or co-author. The second involves books to which I have contributed a chapter, section, or foreword.
This post will only discuss books which list me as author or co-author.
In July 2004 I published
The Tao of Network Security Monitoring: Beyond Intrusion Detection. This book was cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 result of everything I had learned since 1997-98 regarding detecting and responding to intruders, primarily using network-centric means. It is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most complete examination of NSM philosophy available. I am particularly happy with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 NSM history appendix. It cites and summarizes influential computer security papers over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 four decade history of NSM to that point.
The main problem with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Tao is that certain details of specific software versions are very outdated. Established software like Tcpdump, Argus, and Sguil function much cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same way, and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 core NSM data types remain timeless. You would not be able to use cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Bro chapter with modern Bro versions, for example. Still, I recommend anyone serious about NSM read cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Tao.
The introduction describes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Tao using cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se words:
Part I offers an introduction to Network Security Monitoring, an operational framework for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 collection, analysis, and escalation of indications and warnings (I&W) to detect and respond to intrusions. Part I begins with an analysis of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 terms and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ory held by NSM practitioners. The first chapter discusses cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 security process and defines words like security, risk, and threat. It also makes assumptions about cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 intruder and his prey that set cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 stage for NSM operations. The second chapter addresses NSM directly, explaining why NSM is not implemented by modern NIDS' alone. The third chapter focuses on deployment considerations, such as how to access traffic using hubs, taps, SPAN ports, or inline devices.
Part II begins an exploration of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 NSM “product, process, people” triad. Chapter 4 is a case study called cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 “reference intrusion model.” This is an incident explained from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 point of view of an omniscient observer. During this intrusion, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 victim collected full content data in two locations. We will use those two trace files while explaining cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 tools discussed in Part II. Following cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 reference intrusion model, I devote chapters to each of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 four types of data which must be collected to perform network security monitoring – full content, session, statistical, and alert data. Each chapter describes open source tools tested on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 FreeBSD operating system and available on ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r UNIX derivatives. Part II also includes a look at tools to manipulate and modify traffic. Featured in Part II are little-discussed NIDS' like Bro and Prelude, and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first true open source NSM suite, Sguil.
Part III continues cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 NSM triad by discussing processes. If analysts don’t know how to handle events, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y’re likely to ignore cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m. I provide best practices in one chapter, and follow with a second chapter explicitly for technical managers. That material explains how to conduct emergency NSM in an incident response scenario, how to evaluate monitoring vendors, and how to deploy a NSM architecture.
Part IV is intended for analysts and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir supervisors. Entry level and intermediate analysts frequently wonder how to move to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 next level of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir profession. I offer some guidance for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 five topics with which a security professional should be proficient: weapons and tactics, telecommunications, system administration, scripting and programming, and management and policy. The next three chapters offer case studies, showing analysts how to apply NSM principles to intrusions and related scenarios.
Part V is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 offensive counterpart to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 defensive aspects of Parts II, III, and IV. I discuss how to attack products, processes, and people. The first chapter examines tools to generate arbitrary packets, manipulate traffic, conduct reconnaissance, and exploit flaws inn Cisco, Solaris, and Microsoft targets. In a second chapter I rely on my experience performing detection and response to show how intruders attack cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 mindset and procedures upon which analysts rely.
An epilogue on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 future of NSM follows Part V. The appendices feature several TCP/IP protocol header charts and explanations. I also wrote an intellectual history of network security, with abstracts of some of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most important papers written during cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 last twenty-five years. Please take cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 time to at least skim this appendix, You'll see that many of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 “revolutionary ideas” heralded in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 press were in some cases proposed decades ago.

The Tao lists as 832 pages. I planned to write 10 more chapters, but my publisher and I realized that we needed to get cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Tao out cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 door. ("
Real artists ship.") I wanted to address ways to watch traffic leaving cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 enterprise in order to identify intruders, racá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r than concentrating on inbound traffic, as was popular in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 1990s and 2000s. Therefore, I wrote
Extrusion Detection: Security Monitoring for Internal Intrusions.
I've called cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Tao "cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Constitution" and Extrusion "cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Bill of Rights." These two books were written in 2004-2005, so cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y are tightly coupled in terms of language and methodology. Because Extrusion is tied more closely with data types, and less with specific software, I think it has aged better in this respect.
The introduction describes Extrusion using cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se words:
Part I mixes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ory with architectural considerations. Chapter 1 is a recap of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 major cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ories, tools, and techniques from The Tao. It is important for readers to understand that NSM has a specific technical meaning and that NSM is not cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same process as intrusion detection. Chapter 2 describes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 architectural requirements for designing a network best suited to control, detect, and respond to intrusions. Because this chapter is not written with specific tools in mind, security architects can implement cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir desired solutions regardless of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 remainder of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 book. Chapter 3 explains cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ory of extrusion detection and sets cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 stage for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 remainder of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 book. Chapter 4 describes how to gain visibility to internal traffic. Part I concludes with Chapter 5, original material by Ken Meyers explaining how internal network design can enhance cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 control and detection of internal threats.
Part II is aimed at security analysts and operators; it is traffic-oriented and requires basic understanding of TCP/IP and packet analysis. Chapter 6 offers a method of dissecting session and full content data to unearth unauthorized activity. Chapter 7 offers guidance on responding to intrusions, from a network-centric perspective. Chapter 8 concludes part III by demonstrating principles of network forensics.
Part III collects case studies of interest to all types of security professionals. Chapter 9 applies cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 lessons of Chapter 6 and explains how an internal bot net was discovered using Traffic Threat Assessment. Chapter 10 features analysis of IRC bot nets, contributed by LURHQ analyst Michael Heiser.
An epilogue points to future developments. The first appendix, Appendix A, describes how to install Argus and NetFlow collection tools to capture session data. Appendix B explains how to install a minimal Snort deployment in an emergency. Appendix C, by Tenable Network Security founder Ron Gula, examines cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 variety of host and vulnerability enumeration techniques available in commercial and open source tools. The book concludes with Appendix D, where Red Cliff Consulting expert Rohyt Belani offers guidance on internal host enumeration using open source tools.

At cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same time I was writing Tao and Extrusion, I was collaborating with my friends and colleagues Keith Jones and Curtis Rose on a third book,
Real Digital Forensics: Computer Security and Incident Response. This was a ground-breaking effort, published in October 2005. What made this book so interesting is that Keith, Curtis and I created workstations running live software, compromised each one, and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n provided forensic evidence for readers on a companion DVD.
This had never been done in book form, and after surviving cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 process we understood why! The legal issues alone were enough to almost make us abandon cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 effort. Microsoft did not want us to "distribute" a forensic image of a Windows system, so we had to zero out key Windows binaries to satisfy cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir lawyers.
The primary weakness of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 book in 2017 is that operating systems have evolved, and many more forensics books have been written. It continues to be an interesting exercise to examine cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 forensic practices advocated by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 book to see how cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y apply to more modern situations.
This
review of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 book includes a summary of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 contents:
• Live incident response (collecting and analyzing volatile and nonvolatile data; 72 pp.)
• Collecting and analyzing network-based data (live network surveillance and data analysis; 87 pp.)
• Forensic duplication of various devices using commercial and open source tools (43 pp.)
• Basic media analysis (deleted data recovery, metadata, hash analysis, “carving”/signature analysis, keyword searching, web browsing history, email, and registry analyses; 96 pp.)
• Unknown tool/binary analysis (180 pp.)
• Creating cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 “ultimate response CD” (response toolkit creation; 31 pp.)
• Mobile device and removable media forensics (79 pp.)
• On-line-based forensics (tracing emails and domain name ownership; 30 pp.)
• Introduction to Perl scripting (12 pp.)

After those three titles, I was done with writing for a while. However, in 2012 I taught a class for Black Hat in Abu Dhabi. I realized many of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 students lacked cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 fundamental understanding of how networks operated and how network security monitoring could help cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m detect and respond to intrusions. I decided to write a book that would explain NSM from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 ground up. While I assumed cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 reader would have familiarity with computing and some security concepts, I did not try to write cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 book for existing security experts.
The main drawback of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 book is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 integration of Security Onion coverage. SO is a wonderful open source suite, partly because it is kept so current. That makes it difficult for a print book to track changes in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 software installation and configuration options. While you can still use PNSM to install and use SO, you are better off relying on Doug Burks' excellent online documentation.
PNSM is an awesome resource for learning how to use SO and ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r tools to detect and respond to intrusions. I am particularly pleased with chapter 9, on NSM operations. It is a joke that I often tell people to "read chapter 9" when anyone asks me about CIRTs.
The introduction describes PNSM using cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se words:
Part I, “Getting Started,” introduces NSM and how to think about sensor placement.
• Chapter 1, “Network Security Monitoring Rationale,” explains why NSM matters, to help you gain cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 support needed to deploy NSM in your environment.
• Chapter 2, “Collecting Network Traffic: Access, Storage, and Management,”addresses cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 challenges and solutions surrounding physical access to network traffic.
Part II, “Security Onion Deployment,” focuses on installing SO on hardware and configuring SO effectively.
• Chapter 3, “Stand-alone NSM Deployment and Installation,” introduces SO and explains how to install cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 software on spare hardware to gain initial NSM capability at low or no cost.
• Chapter 4, “Distributed Deployment,” extends Chapter 3 to describe how to install a dispersed SO system.
• Chapter 5, “SO Platform Housekeeping,” discusses maintenance activities for keeping your SO installation running smoothly.
Part III, “Tools,” describes key software shipped with SO and how to use cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se applications.
• Chapter 6, “Command Line Packet Analysis Tools,” explains cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 key features of Tcpdump, Tshark, Dumpcap, and Argus in SO.
• Chapter 7, “Graphical Packet Analysis Tools,” adds GUI-based software to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 mix, describing Wireshark, Xplico, and NetworkMiner.
• Chapter 8, “NSM Consoles,” shows how NSM suites, like Sguil, Squert, Snorby, and ELSA, enable detection and response workflows.
Part IV, “NSM in Action,” discusses how to use NSM processes and data to detect and respond to intrusions.
• Chapter 9, “NSM Operations,” shares my experience building and leading a global computer incident response team (CIRT).
• Chapter 10, “Server-side Compromise,” is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first NSM case study, wherein you’ll learn how to apply NSM principles to identify and validate cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 compromise of an Internet-facing application.
• Chapter 11, “Client-side Compromise,” is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 second NSM case study, offering an example of a user being victimized by a client-side attack.
• Chapter 12, “Extending SO,” concludes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 main text with coverage of tools and techniques to expand SO’s capabilities.
• Chapter 13, “Proxies and Checksums,” concludes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 main text by addressing two challenges to conducting NSM.
The Conclusion offers a few thoughts on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 future of NSM, especially with respect to cloud environments.
The Appendix, “SO Scripts and Configuration,” includes information from SO developer Doug Burks on core SO configuration files and control scripts.
I hope this post helps explain cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 different books I've written, as well as cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir applicability to modern security scenarios.