On Mon, Apr 16, 2007 at 01:45:36AM -0700, Clint Pachl scribbled:

[snip]

# The Tao of Network Security Monitoring: Beyond Intrusion Detection, 
# 
<http://www.amazon.com/gp/product/0321246772/ref=wl_it_dp/103-5124063-8263036?ie=UTF8&coliid=IHNHJ98G36HX1&colid=1B2FORVUWNNME>
 
# by Richard Bejtlich 
# 
<http://www.amazon.com/gp/product/0321246772/ref=wl_it_dp/103-5124063-8263036?ie=UTF8&coliid=IHNHJ98G36HX1&colid=1B2FORVUWNNME>


This is the only one I can comment, having read it cover to cover sometime 
last year.  First off, it is excellent.

This title is effectively 'first in a series', in a sense; it forms the
groundwork for an understanding that can only come with lots of practice.

It covers a few of the topics you noted, including architecture, best practices,
and a lot on monitoring (obviously!).  It's all well thought through and
having spoken to Richard on a number of occasions, you won't find a better
person to describe such a topic.

I bought it in a store a number of hours south of here on an impulse.  
I can say it was the best impulse buy I've *ever* made.

I'll leave it at that.



-- Jonathan Towne

Reply via email to