Customers who viewed this item also viewed
Buy new:
-14% $51.59$51.59
FREE delivery Saturday, November 8
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Good
$26.86$26.86
FREE delivery Saturday, November 8 on orders shipped by Amazon over $35
Ships from: Amazon Sold by: Dream Books Co.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Image Unavailable
Color:
-
-
-
- To view this video download Flash Player
Follow the author
OK
The Practice of Network Security Monitoring: Understanding Incident Detection and Response Illustrated Edition
Purchase options and add-ons
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.
You'll learn how to:
–Determine where to deploy NSM platforms, and size them for the monitored networks
–Deploy stand-alone or distributed NSM installations
–Use command line and graphical packet analysis tools, and NSM consoles
–Interpret network evidence from server-side and client-side intrusions
–Integrate threat intelligence into NSM software to identify sophisticated adversaries
There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
- ISBN-101593275099
- ISBN-13978-1593275099
- EditionIllustrated
- PublisherNo Starch Press
- Publication dateJuly 15, 2013
- LanguageEnglish
- Dimensions7 x 0.74 x 9.25 inches
- Print length376 pages
Frequently bought together

What do customers buy after viewing this item?
Most purchased
in this set of products
Python Crash Course, 3rd Edition: A Hands-On, Project-Based Introduction to ProgrammingPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Saturday, Nov 8Highest rated
in this set of products
The Linux Command Line, 2nd Edition: A Complete IntroductionPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Saturday, Nov 8Lowest Price
in this set of products
Blue Team Field Manual (BTFM) (Field Manual Series)PaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Saturday, Nov 8
Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network ProblemsPaperbackFREE ShippingOnly 1 left in stock - order soon.
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in KaliPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Saturday, Nov 8
How Cybersecurity Really Works: A Hands-On Guide for Total BeginnersPaperbackGet it as soon as Friday, Nov 14
Cybersecurity for Small Networks: A Guide for the Reasonably ParanoidPaperback$3.99 shippingGet it Nov 17 - 21
PowerShell for Sysadmins: Workflow Automation Made EasyPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Saturday, Nov 8
DevOps for the Desperate: A Hands-On Survival GuidePaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Saturday, Nov 8
Customers also bought or read
- Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems
Paperback$32.85$32.85FREE delivery Thu, Nov 13 - Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Paperback$23.74$23.74Delivery Mon, Nov 17 - The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference#1 Best SellerEmail Administration
Hardcover$69.02$69.02$3.99 delivery Thu, Nov 20 - How Cybersecurity Really Works: A Hands-On Guide for Total Beginners
Paperback$27.84$27.84Delivery Mon, Nov 17 - Applied Network Security Monitoring: Collection, Detection, and Analysis
Paperback$28.70$28.70FREE delivery Thu, Nov 13 - Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Paperback$44.22$44.22FREE delivery Saturday - Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS#1 Best SellerMicrosoft .NET
Paperback$39.49$39.49FREE delivery Saturday - Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid
Paperback$27.10$27.10$3.99 delivery Fri, Nov 21 - Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
Paperback$19.97$19.97$3.99 delivery Fri, Nov 28 - The Tao Of Network Security Monitoring: Beyond Intrusion Detection
Paperback$68.65$68.65FREE delivery Fri, Nov 28 - The Linux Command Line, 2nd Edition: A Complete Introduction#1 Best SellerLinux Programming
Paperback$23.99$23.99Delivery Saturday - Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Paperback$46.49$46.49FREE delivery Saturday - Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Paperback$18.73$18.73Delivery Saturday - Black Hat Bash: Creative Scripting for Hackers and Pentesters
Paperback$44.52$44.52FREE delivery Mon, Dec 1 - Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
Paperback$41.99$41.99FREE delivery Saturday - Web Security for Developers: Real Threats, Practical Defense
Paperback$9.78$9.78$3.99 delivery Wed, Nov 12 - How Linux Works, 3rd Edition: What Every Superuser Should Know
Paperback$27.23$27.23Delivery Fri, Nov 21 - Practical Linux Forensics: A Guide for Digital Investigators
Paperback$40.29$40.29$3.99 delivery Fri, Nov 21 - Network Basics for Hackers: How Networks Work and How They Break
Paperback$36.89$36.89FREE delivery Saturday - Network Warrior: Everything You Need to Know That Wasn't on the CCNA Exam
Paperback$28.47$28.47Delivery Saturday - TCP/IP Illustrated: The Protocols, Volume 1 (Addison-Wesley Professional Computing Series)#1 Best SellerTCP-IP
Hardcover$51.26$51.26FREE delivery Mon, Nov 10 - The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Paperback$36.47$36.47FREE delivery Saturday - Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Paperback$27.76$27.76FREE delivery Mon, Nov 10 - PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers
Paperback$32.60$32.60Delivery Saturday
Editorial Reviews
Review
—Ben Rothke, Slashdot
"If you are in cyber security, this is a must read. The book is the best resource for tools I have seen anywhere."
—Stephen Northcutt, SANS Institute
"A very well written technical book. I would recommend this for anyone getting into the field of incident response who doesn't have a great understanding of NSM."
—Greg Hetrick, PaulDotCom
"Deploying NSM not only means you can quickly identify, contain, and remediate intrusions, it gives you insight into the network as a whole."
—Michael W. Lucas, author of Absolute OpenBSD, 2nd Edition
"The Practice of Network Security Monitoring: the best surveillance book you'll read anytime soon."
—Peter N. M. Hansteen, author of The Book of PF
"This gem from No Starch Press covers the life-cycle of Network Security Monitoring (NSM) in great detail and leans on Security Onion as its backbone. I recommend an immediate download of the latest version of Security Onion and a swift purchase of Richard’s book."
—Russ McRee, senior security analyst, Microsoft
"The principles Bejtlich outlines for running your security monitoring are the kind of best practice you should apply to any important server."
—Mary Branscombe, ZDNet
"If you want to know what to do when intruders arrive on your network and how to best prepare for that eventuality, you must read this book."
—Sandra Henry-Stocker, ITWorld
"Bejtlich is a master of his craft and also possesses the rare gift of being able to share his knowledge in a comprehensible way."
—Richard Austin, IEEE Cipher
"As tech books go, it's a pretty fun ride."
—Michael Larsen, Testhead
About the Author
Product details
- Publisher : No Starch Press
- Publication date : July 15, 2013
- Edition : Illustrated
- Language : English
- Print length : 376 pages
- ISBN-10 : 1593275099
- ISBN-13 : 978-1593275099
- Item Weight : 1.35 pounds
- Dimensions : 7 x 0.74 x 9.25 inches
- Best Sellers Rank: #164,136 in Books (See Top 100 in Books)
- #14 in Computer Networks
- #81 in Computer Hacking
- #98 in Computer Network Security
- Customer Reviews:
About the author

Mr. Bejtlich has been an author for two decades. Please see www.linkedin.com/in/richardbejtlich/ for details on Mr. Bejtlich's biography. As an Amazon Associate I earn from qualifying purchases.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book provides a high-level overview of Network Security Monitoring concepts and is thorough in its coverage. They appreciate its readability, with one customer specifically enjoying chapter 12. The book receives mixed feedback regarding its ease of use and staleness, with some customers noting it's a little dated.
AI Generated from the text of customer reviews
Select to learn more
Customers appreciate the book's depth, describing it as a thorough guide that provides a high-level overview of hows and whys.
"Starts with the basics and gives thorough explanations. Good reference even if you are a network monitoring guru...." Read more
"I'm new to network security monitoring, and this is an excellent guide...." Read more
"Good solid introduction that addresses some of the gaps that result from teaching yourself or learning as you go." Read more
"A great resource for those looking to establish their NSM." Read more
Customers appreciate the book's content on network security monitoring, with one customer noting it helps with Security Onion deployment, while another mentions it provides practical guidance for securing network borders.
"Great into to Network Security Monitoring... goes a bit into detail about how to use open source to do it, which can be done with google search, but..." Read more
"This book has a lot of great content regarding Network Security Monitoring in general, but is especially helpful if you are rolling out Security..." Read more
"...This book gives you the ninja skills to actually seal your network borders and measure the level of the threat...." Read more
"The unofficial Security Onion Manual..." Read more
Customers find the book easy to read, with one mentioning they particularly enjoyed chapter 12 on extending SO.
"Well organized, thorough, and enjoyable read. Great background information to support practical examples and walk-throughs...." Read more
"I found this book very interesting, which is really something for an infosec book...." Read more
"...I really enjoyed chapter 12 extending SO, being able to track Binaries and do MD5's and compare them against tools like virus total and other..." Read more
Customers have mixed opinions about the book's ease of use, with one customer finding it easy to understand, while another notes it is not necessarily suitable for beginners.
"An easy to understand book. Not too heavy w/facts, but it's a great way to get some experience with Wireshark." Read more
"...It's not necessarily for beginners, but readers in all stages of professional development will benefit from the content...." Read more
"...It is a complex topic and this book takes you through a difficult process and gets you up and running with a real soluiton that immediately brings..." Read more
"...Maybe not for advanced or expert users. Also, just slightly out of date so a few things are off a bit but 95% is still current." Read more
Customers have mixed opinions about the book's staleness, with some finding it outdated while one customer notes that 95% of the content is still current.
"...Maybe not for advanced or expert users. Also, just slightly out of date so a few things are off a bit but 95% is still current." Read more
"...just slightly out of date so a few things are off a bit but 95% is still current." Read more
"This is a great book. It's a little dated, so, for instance, when doing installations as in chapters 3 and 4, it would be best to use the more up to..." Read more
Reviews with images
A New Candidate for the Cybersecurity Canon
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on September 3, 2015Format: KindleVerified PurchaseAs we enter the murky age of Internet of Things (or "Internet of Insecure Things", "Internet of Evil Things", "Botnet of Things", take your pick) monitoring your home network has to become a common skill. Although by no means confined to application in home environments, The Practice of Network Security Monitoring does allow a modestly technically adept user to do just that. This book walks you through understanding the concepts, installing the needed software, configuring network monitoring components, and using some of the many free solutions for detecting unwanted or malicious traffic.
For those who want to apply this work at home, allow me to make a few suggestions about corollary purchases you may need to make. I recommend dedicating a desktop or tower computer to the task of server. It doesn't need an especially powerful CPU, but it should have a lot of RAM, at least 8 GB. Purchase your RAM with a view to exanding; using 8GB as an example, don't buy 4 2GB sticks, but rather 2 4GB sticks. Later you could by 2 x 4GB or 2 x 8GB sticks to upgrade memory. You will also need at least 1 extra NIC (Network Interface Card), which will be in permanent 'listen only' (aka "promiscuous") mode. You will be using the free Security Onion solution, running on the free Ubuntu 12.04 Linux, so you can skip buying a license for Windows if you purchase everything from scratch. Finally you will need at least one network device that can duplicate traffic. The book will explain the difference between spanning (or 'mirroring') and tapping, but unless you are a sufficiently knowledgeable about networking, you will probably do well to buy a Dualcomm DCSW-1005 USB Powered 5-Port 10/100 Fast Ethernet Switch TAP (Port Mirroring) - it is drop dead simple to install and use.
You really can do this - enjoy!
- Reviewed in the United States on May 16, 2015Format: PaperbackVerified PurchaseI thought the Practice of Network Security Monitoring was a great book. I see companies spend millions of dollars on their NSM solution all while there is an open source solution. Spend some money on hardware and network taps and your ready to go! I really like how Bejtlich went into sensor placement and NAT issues. There is nothing worse then doing investigations with with multiple layers or NAT. I would have like to seen a little bit more on how to handle event load that a IDS will produce in a network and maybe some best practices on what signatures to enable.
I really enjoyed chapter 12 extending SO, being able to track Binaries and do MD5's and compare them against tools like virus total and other external tools helps stay ahead of the bad guys. It would have been also neat to show how to extract URLs out of SMTP emails and run them against third party analysis. I believe email attachments are not as easy as getting a user to click on URL. I also would of liked to see a little bit more advanced solution that automatically queries virus total via API then the results are sent back into the monitoring solution via syslog, so the analyst never has to leave the console.
Overall a great book!
- Reviewed in the United States on December 8, 2013Format: PaperbackVerified PurchaseGreat into to Network Security Monitoring... goes a bit into detail about how to use open source to do it, which can be done with google search, but a great way to get a quick hands on knowledge in the field.
- Reviewed in the United States on March 20, 2014Format: PaperbackVerified PurchaseThe "Cybersecurity and Cyberwar" book told you what was going on and how to protect yourself in general. This book gives you the ninja skills to actually seal your network borders and measure the level of the threat. Various methods and opensource tools are used to build a high level of protection for the reader's system.
Some of the tools demonstrated have a user interface, but most of the operating system defense requires command line operation so be prepared to do some heavy screen reading. Also, a large amount of filtering of log files may be required to see a pattern in the attacks. Be serious about this or be prepared to be a victim. The current state of network protection doesn't have a middle ground.
- Reviewed in the United States on January 6, 2014Format: PaperbackVerified PurchaseThis book has a lot of great content regarding Network Security Monitoring in general, but is especially helpful if you are rolling out Security Onion. There are a lot of videos and online tutorials out there but I like to be able to put my hands on it and have it all in one place. It's not necessarily for beginners, but readers in all stages of professional development will benefit from the content. It is well written and presented in a way that flows nicely. Lots of helpful tips and insight.
- Reviewed in the United States on October 20, 2017Format: KindleVerified PurchaseHigh level over view for beginners. Talks about mostly concepts but not much about real world applications.
- Reviewed in the United States on May 7, 2021Format: PaperbackVerified PurchaseThis book takes what can be a dry topic to some and adds punch and power to explanation and gives you a basis to understand what to look for. Good as a starting point to not be lazy and start understanding threat hunting.
- Reviewed in the United States on September 13, 2015Format: PaperbackVerified PurchaseGreat book! I have several years experience in NSM and Security Onion. I thought I knew quite a bit but this book expanded upon my knowledge of NSM and Security Onion. Maybe not for advanced or expert users. Also, just slightly out of date so a few things are off a bit but 95% is still current.
Top reviews from other countries
Blaine LosierReviewed in Canada on October 23, 20185.0 out of 5 stars Good Reference
Format: PaperbackVerified PurchaseGood reference for anyone studying in Cyber Security
-
Fernando Nistal MéndezReviewed in Spain on February 22, 20205.0 out of 5 stars Práctico, conciso y didáctico.
Format: PaperbackVerified PurchasePráctico, conciso y didáctico.
-
FlorentReviewed in France on June 18, 20144.0 out of 5 stars J'en attendais plus
Format: PaperbackVerified PurchaseIl s'agit d'un livre type listing d'outils, et en particulier security onion.
J'attendais de Richard un vrai retour d'expérience avec des cas d'étude complexes, mais là c'est vraiment la base pure et dure de la mise en place d'un système de monitoring.
Intéressant, mais sans plus. Ca ne restera pas un livre culte.
Amazon CustomerReviewed in the United Kingdom on June 3, 20165.0 out of 5 stars Five Stars
Format: PaperbackVerified PurchaseGreat. Thanks :-)
Jordan BirdReviewed in Germany on April 28, 20213.0 out of 5 stars Too basic and too many tutorials
Format: PaperbackVerified PurchaseThe content is somewhat basic, with numerous tutorials and installation/configuration walk-throughs, making it more akin to a tutorial or blog than a book.














![Intellectual Property In the Digital Age [Edition 2024]: A Practical Guide on Patents, Trademarks, Copyrights, and Protecting Confidential Information [AI Insight Bonus]](https://cdn.statically.io/img/m.media-amazon.com/images/I/41WitElGixL._AC_SR100,100_QL65_.jpg)
![Texas Property and Casualty Study Cards: Texas Property and Casualty Insurance License Exam Prep 2025-2026 and Practice Test Questions [Full Color Cards]](https://cdn.statically.io/img/m.media-amazon.com/images/I/318M9t1zQpL._AC_SR100,100_QL65_.jpg)
