Applied Network Security Monitoring and over 2 million other books are available for Amazon Kindle . Learn more
  • RRP: £30.99
  • You Save: £3.10 (10%)
FREE Delivery in the UK.
In stock.
Dispatched from and sold by Amazon.
Gift-wrap available.
Trade in your item
Get a £8.96
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Applied Network Security Monitoring: Collection, Detection, and Analysis Paperback – 5 Dec 2013

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
"Please retry"
£19.00 £22.90

Trade In Promotion

Frequently Bought Together

Applied Network Security Monitoring: Collection, Detection, and Analysis + The Practice of Network Security Monitoring: Understanding Incident Detection and Response + Network Forensics: Tracking Hackers Through Cyberspace
Price For All Three: £87.58

Buy the selected items together

Trade In this Item for up to £8.96
Trade in Applied Network Security Monitoring: Collection, Detection, and Analysis for an Amazon Gift Card of up to £8.96, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

  • Paperback: 498 pages
  • Publisher: Syngress (5 Dec 2013)
  • Language: English
  • ISBN-10: 0124172083
  • ISBN-13: 978-0124172081
  • Product Dimensions: 19 x 2.8 x 23.5 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Bestsellers Rank: 171,320 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, and more.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See both customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

Format: Paperback
I was impressed by the top quality of the content of this book, on a field that although few other books have been written , it is simple, well written, detailed with the necessary theory and practical examples along with valuable practical advice from security experts.

One of the most interesting IT security books I have read and definitely the best book on the topic. Credit to the author who donates his royalties from the book to charities. Great book , great authors.

Note: This book is not about setting up Security Onion and filling 3-4 chapters with screenshots and step by step instructions, like another book on the same topic which should be avoided.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
The book gives a very clear overview of Network Security Monitoring and the various tools that are available. The author gives a lot of tips
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Helpful Customer Reviews on (beta) 17 reviews
3 of 3 people found the following review helpful
Written by Analysts for Analysts. 27 Mar 2014
By Danny Akacki - Published on
Format: Paperback Verified Purchase
Here's what you need to know about Applied NSM.

1. It's an amazingly easy read.

Those of us who have ever been forced into digesting anything ever published by Cisco Press know easy to read textbooks are diamonds in the rough. It's clear the authors of Applied NSM went to great lengths to be as technically thorough as possible while maintaining an easy, entertaining and conversational tone throughout the book. It's the anti "Makes Me Want To Bash My Face Into My Desk Just To Stay Awake" book.

2. The right tool for the job but...

The goal of any analyst is simple but crucial, find evil by any means necessary. To that end you need better weapons than your adversary. In this book Security Onion is your arsenal and the authors perform a deep dive into all wonderful toys Security Onion has to offer. The tools listed within the pages of this book are your ticket to a better way to find the badness lurking on your clients network. That being said...

3. alone will not save you and the authors know it.

Of all the weapons at your disposal in the never-ending hunt for evil, unequivocally the most important is that big spongy thing between your ears. This book isn't just a stack of man pages with a fancy cover thrown on, it provides valuable insight and guidance to aid your own unique thought process and hunting style. On that topic, a special note...

4. Get your mind right.

Chapter 15 "The Analysis Process" should be required reading for both every newbie working in a SOC and every jaded veteran. This chapter could be it's own book and if I have any complaint about Applied NSM it's that this chapter wasn't long enough for me. It's so absolutely crucial I recommend you read it first, then read it again. If you buy the book for no other reason, buy it for Chapter 15.

So that's it, whether you're a n00b looking to find his footing in this industry or a battle tested warrior looking for new ways to catch the bad guys, Applied Network Security Monitoring is an absolute must have. Good hunting!
2 of 2 people found the following review helpful
Should be read by anyone starting or involved in network security monitoring! 11 July 2014
By Bryon Hundley - Published on
Format: Paperback
Another outstanding PRACTICAL approach by Chris Sanders accompanied by Jason Smith this round. This book should be required reading for all intrusion analyst and those looking to develop a security monitoring program. The ACF mentioned in the book should be the standard for building a data collection architecture in my opinion. Organizations use the "everything and the kitchen sink" approach all to often (like let's throw everything into Arcsight) without looking at what they should really be collecting and defining out the results that should be achieved.
I am also a strong believer and practitioner of the Threat Centric approach mentioned in the book. It seems the industry is turning in that direction and seeing threats for what they are instead of each falling into a neat category. It's the right approach and this book applies it in a practical manner that makes sense.
2 of 2 people found the following review helpful
Excellent guide for starting and expanding a Network Security Pratice. 17 Dec 2013
By Wesley Allen - Published on
Format: Paperback
Great book! If you are totally new to the practice of NSM then all you need to get set up, capture some data and start doing some analysis is in here. If you are already doing some NSM work, then this will help you extend and expand into new areas. The authors focus on open source / free programs and utilities, so the only cost to start a IDS is some hardware and your time.

I have been doing security for awhile, but not much focused intrusion detection before my current position. This book really helped "fill in the gaps" in my knowledge of NSM and give me a push in the right direction as far as using SiLK and a couple of the other tools. There is more then enough info to get started, but not to much that would be overly specific to a given setup, so it is still up to you to do a bit of research and dig deeper into the areas that the book introduces that you might want to use in your day to day work. You do need to have the basics of networking, security and TCP/UDP/IP down first, but they do a good job starting slow and building up.

I read through the book pretty quickly to pick up the areas I want to work in more, and will continue to use it as a reference in my work.
1 of 1 people found the following review helpful
Surprisingly Good Book 9 Oct 2014
By Cliente de Amazon - Published on
Format: Paperback
I was expecting this book to be pure torture. This is a rather dry subject but somehow the authors have managed to write a really great book. It's really very impressive. The area of Network Security Monitoring is vast and the learning curve very steep for anybody new to the field but this book is a great help. Chris is clearly a very capable analyst as well as a talented technical educator. I am about 50% through the book but I have learned a lot. Needs to be read in conjunction with Richard Bejtlich's book on the same subject but I have to recognize this book as the better of the two.
1 of 1 people found the following review helpful
Great book overall 18 Sep 2014
By Ryan - Published on
Format: Paperback
As someone looking to make a career shift into network security, I found this to be a great book. The book is well written, and the author, Chris Sanders, presents the material in a way that makes it easy to grasp and understand. So, why 4 stars and not 5? There were several typos throughout the book, including a couple that had me flipping back a few pages just to make sure I read the material correctly.
Were these reviews helpful? Let us know