"A comprehensive guide. Certain to make the reader a better information security practitioner, and their network more secure."<br /><b>—Ben Rothke, Slashdot<br /></b><br />"If you are in cyber security, this is a must read. The book is the best resource for tools I have seen anywhere."<br /><b>—Stephen Northcutt, SANS Institute <br /></b><br />"A very well written technical book. I would recommend this for anyone getting into the field of incident response who doesn't have a great understanding of NSM."<br /><b>—Greg Hetrick, PaulDotCom <br /></b><br />"Deploying NSM not only means you can quickly identify, contain, and remediate intrusions, it gives you insight into the network as a whole."<br /><b>—Michael W. Lucas, author of Absolute OpenBSD, 2nd Edition <br /></b><br />"The Practice of Network Security Monitoring: the best surveillance book you'll read anytime soon."<br /><b>—Peter N. M. Hansteen, author of The Book of PF <br /></b><br />"This gem from No Starch Press covers the life-cycle of Network Security Monitoring (NSM) in great detail and leans on Security Onion as its backbone. I recommend an immediate download of the latest version of Security Onion and a swift purchase of Richard’s book."<br /><b>—Russ McRee, senior security analyst, Microsoft <br /></b><br />"The principles Bejtlich outlines for running your security monitoring are the kind of best practice you should apply to any important server."<br /><b>—Mary Branscombe, ZDNet <br /></b><br />"If you want to know what to do when intruders arrive on your network and how to best prepare for that eventuality, you <i>must</i> read this book."<br /><b>—Sandra Henry-Stocker, ITWorld<br /></b><br />"Bejtlich is a master of his craft and also possesses the rare gift of being able to share his knowledge in a comprehensible way."<br /><b>—Richard Austin, IEEE Cipher<br /></b><br />"As tech books go, it's a pretty fun ride."<br /><b>—Michael Larsen, Testhead<br /></b>