Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Network security through data analys...
~
Collins, Michael
Network security through data analysis : = from data to action /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Network security through data analysis :/ Michael Collins.
Reminder of title:
from data to action /
remainder title:
from data to action
Author:
Collins, Michael
Published:
Boston :O'Reilly Media, : c2017.,
Description:
xxii, 401 p. :ill. ; : 24 cm.;
Subject:
Communication - Network analysis. -
ISBN:
9781491962848 (pbk.) :
Network security through data analysis : = from data to action /
Collins, Michael
Network security through data analysis :
from data to action /from data to actionMichael Collins. - 2nd ed. - Boston :O'Reilly Media,c2017. - xxii, 401 p. :ill. ;24 cm.
Includes bibliographical references and index.
Part 1. Data. Organizing data : vantage, domain, action, and validity -- Vantage : understanding sensor placement in networks -- Sensors in the network domain -- Data in the service domain -- Sensors in the service domain -- Data and sensors in the host domain -- Data and sensors in the active domain -- Part 2. Tools. Getting data in one place -- The SiLK suite -- Reference and lookup : tools for figuring out who someone is -- Part 3. Analytics. Exploratory data analysis and visualization -- On analyzing text -- On fumbling -- On volume and time -- On graphs -- On insider threat -- On threat intelligence -- Application identification -- On network mapping -- On working with Ops.
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. -- Provided by publisher.
ISBN: 9781491962848 (pbk.) :NT1541Subjects--Topical Terms:
933331
Communication
--Network analysis.
LC Class. No.: TK5105.59 / .C64 2017
Dewey Class. No.: 005.8
Network security through data analysis : = from data to action /
LDR
:02052nam 2200193 a 4500
001
891726
008
181002s2017 maua b 001 0 eng d
020
$a
9781491962848 (pbk.) :
$c
NT1541
020
$a
1491962844 (pbk.)
035
$a
4
050
0 0
$a
TK5105.59
$b
.C64 2017
082
0 4
$a
005.8
$2
23
100
1
$a
Collins, Michael
$q
(Michael Patrick)
$3
1150702
245
1 0
$a
Network security through data analysis :
$b
from data to action /
$c
Michael Collins.
246
3 0
$a
from data to action
250
$a
2nd ed.
260
$a
Boston :
$b
O'Reilly Media,
$c
c2017.
300
$a
xxii, 401 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
505
0
$a
Part 1. Data. Organizing data : vantage, domain, action, and validity -- Vantage : understanding sensor placement in networks -- Sensors in the network domain -- Data in the service domain -- Sensors in the service domain -- Data and sensors in the host domain -- Data and sensors in the active domain -- Part 2. Tools. Getting data in one place -- The SiLK suite -- Reference and lookup : tools for figuring out who someone is -- Part 3. Analytics. Exploratory data analysis and visualization -- On analyzing text -- On fumbling -- On volume and time -- On graphs -- On insider threat -- On threat intelligence -- Application identification -- On network mapping -- On working with Ops.
520
$a
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. -- Provided by publisher.
650
0
$a
Communication
$x
Network analysis.
$3
933331
650
0
$a
Computer networks
$x
Security measures.
$3
555385
based on 0 review(s)
ALL
圖書館3F 書庫
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
E045184
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
005.8 C712 2017
一般使用(Normal)
On shelf
0
Reserve
1 records • Pages 1 •
1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login