IntermediateDefensiveDetectionNetworking

The Practice of Network Security Monitoring

Understanding Incident Detection and Response

5 / 5

Richard Bejtlich's NSM playbook: how to deploy collection sensors, validate that you actually see what you think you see, and build detection workflows around open-source tools.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2013
Publisher
No Starch Press
Pages
376
Language
English

Read this if

Every SOC analyst and detection engineer. Bejtlich's foundational text on NSM: collect-everything, alert-on-narrow, investigate-broadly. Defines the vocabulary the modern detection field still uses.

Skip this if

Readers wanting current SIEM tooling specifics. The book pre-dates EDR-as-default and modern cloud-native telemetry; the principles transfer, the tooling specifics don't.

Key takeaways

  • Detection without prevention is a strategic choice, not a fallback; Bejtlich was years ahead in arguing the case and the book remains the clearest argument.
  • The four data types (full content, session, transactional, statistical) are still the right framework for thinking about detection coverage.
  • Most SOC failures are organizational and procedural, not tooling; the book's chapters on workflows, runbooks, and analyst growth are still the best in print.

Notes

Pair with Network Security Through Data Analysis (Collins) for the quantitative side and with Practical Packet Analysis (Sanders) for Wireshark fluency. Bejtlich's blog and Twitter remain mandatory reading. Required reading for anyone joining a SOC or designing detection programs; the principles age slowly and are foundational to the discipline.