Security analysts are often responsible for the livelihood of a
business. We all know that information is power. If you find
yourself at a loss in determining what is happening to your
network or if you often find yourself chasing false positives,
help is here.
Finally, a reference that moves beyond the theories of
intrusion detection on to a full analysis of an attack, along
with traces to determine what happened and how. Intrusion
Signatures and Analysis provides a 10-step walkthrough for
every trace covered, which teaches you an intrusion analysis
methodology. There is no other book on the market so
focused on teaching pragmatic log analysis.
You cannot do intrusion analysis effectively without this book!