
Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. You'll learn how to:-Determine where to deploy NSM platforms, and size them for the monitored networks
-Deploy stand-alone or distributed NSM installations
-Use command line and graphical packet analysis tools, and NSM consoles
-Interpret network evidence from server-side and client-side intrusions
-Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Get ready to make SQL easy
Updated for the latest version of SQL, the new edition of this perennial bestseller shows programmers and web developers how to use SQL to build relational databases and get valuable information from them. Covering everything you need to know to make working with SQL easier than ever, topics include how to use SQL to structure a DBMS and implement a database design; secure a database; and retrieve information from a database; and much more.
SQL is the international standard database language used to create, access, manipulate, maintain, and store information in relational database management systems (DBMS) such as Access, Oracle, SQL Server, and MySQL. SQL adds powerful data manipulation and retrieval capabilities to conventional languages--and this book shows you how to harness the core element of relational databases with ease.
- Server platform that gives you choices of development languages, data types, on-premises or cloud, and operating systems
- Find great examples on the use of temporal data
- Jump right in--without previous knowledge of database programming or SQL
As database-driven websites continue to grow in popularity--and complexity--SQL For Dummies is the easy-to-understand, go-to resource you need to use it seamlessly.

This TECHNICAL REFERENCE delivers must-know information on TCP/IP for any IT professional working with Windows .NET Server. The book focuses on core TCP/IP protocols such as IP, ICMP, IGMP, and UDP; physical protocols such as Ethernet; and application protocols such as DNS, DHCP and WINS. It also provides details on NDIS and Windows NT(r)-based networking architecture. The book starts with the fundamentals and builds comprehension layer by layer. Companion CD-ROM contains supplemental materials, including technical white papers. Provides practical and in-depth information on the entire TCP/IP protocols suite for Windows .NET Server Builds comprehension of TCP/IP protocols layer by layer Features ample illustrations, tables, and real-world examples CD-ROM includes Microsoft white papers on TCP/IP

Cut hardware costs, expand your capacity, and manage an entire fleet of virtual machines in your enterprise with the leading virtualization solution, VMware Infrastructure 3 (VI3), by applying the step-by-step instructions in Mastering VMware(R) Infrastructure 3. Packed with the technical details, best practices, and how-tos you need to install, configure, and run a virtual infrastructure at maximum efficiency, this guide is comprehensive and essential. Learn how to create and manage virtual networks and machines, configure every product in the VI3 suite, monitor resources and performance, maintain security, and much more.