free simple web templates

TaoSecurity

Since 1998 Richard Bejtlich has defended Western interests from intruders. Mr. Bejtlich promotes Network Security Monitoring solutions to help global organizations stay in business by detecting and responding to digital threats. Visit TaoSecurity Blog or follow @taosecurity for the latest news.


Since 2004, Mr. Bejtlich has authored or co-authored five books, and contributed to seven others. His Amazon Author Page has more details.

Reach Your Goal Book Cover

Reach Your Goal

My book on stretching, available in a color-photo Collector's Edition, or a black-and-white-photo Amazon Edition.

Mobirise

The Practice of Network Security Monitoring

My latest book on NSM, published by No Starch (use code NSM101 to save 30% when buying from the publisher).

The Tao of Network Security Monitoring Book Cover

The Tao of Network Security Monitoring

My breakthrough book on NSM, published by Addison-Wesley.

Extrusion Detection Book Cover

Extrusion Detection

My pioneering book on detecting intrusions by watching outbound traffic, published by Addison-Wesley.

Real Digital Forensics Book Cover

Real Digital Forensics

My book on investigating intrusions, co-authored with Keith Jones and Curtis Rose, published by Addison-Wesley.

Security Onion Documentation Book Cover

Security Onion Documentation

I wrote the foreword to the printed version of the Security Onion documentation book.

Cyber War in Perspective Book Cover

Cyber War in Perspective

I wrote chapter 18, a case study which examines the Ukraine crisis between 2013-2015, demonstrating that cyber attacks have been used in a broader strategy of information warfare. The entire book, edited by Kenneth Geers, is available online and was published by the CCDCOE.

Practical Malware Analysis Book Cover

Practical Malware Analysis

I wrote the foreword for this ground-breaking book by Michael Sikorski and Andrew Honig, published by No Starch.

Linux Firewalls Book Cover

Linux Firewalls

I wrote the foreword for this innovative book by Michael Rash, published by No Starch.

Incident Response and Computer Forensics Second Edition Book Cover

Incident Response and Computer Forensics Second Edition

I contributed the material for chapter 8 ("Collecting Network-Based Evidence") and chapter 14 ("Analyzing Network Traffic") in the second edition of this book by Kevin Mandia, Chris Prosise, and Matt Pepe. I recommend buying the newer third edition, by Jason Luttgens, Matt Pepe, and Kevin Mandia, published by McGraw-Hill.

Hacking Exposed Fourth Edition Book Cover

Hacking Exposed Fourth Edition

I contributed "Case Study: Network Security Monitoring" to the fourth edition of this book by Stuart McClure, Joel Scambray, and George Kurtz. It contained the first discussion of NSM in a book, aside from the academic papers by NSM inventor Todd Heberlein. I recommend buying the newer seventh edition, published by McGraw-Hill.

American Ulysses Book Cover

Huntpedia

I contributed the foreword for this collection of essays published by Sqrrl, prior to their acquisition by Amazon. David Bianco hosts a copy at ThreatHunting.net. My last name is spelled correctly on the cover and in my signature, but not elsewhere.

© Copyright 2000-2019 TaoSecurity - All Rights Reserved