語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Network security through data analys...
~
Collins, Michael
Network security through data analysis : = from data to action /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Network security through data analysis :/ Michael Collins.
其他題名:
from data to action /
其他題名:
from data to action
作者:
Collins, Michael
出版者:
Boston :O'Reilly Media, : c2017.,
面頁冊數:
xxii, 401 p. :ill. ; : 24 cm.;
標題:
Communication - Network analysis. -
ISBN:
9781491962848 (pbk.) :
Network security through data analysis : = from data to action /
Collins, Michael
Network security through data analysis :
from data to action /from data to actionMichael Collins. - 2nd ed. - Boston :O'Reilly Media,c2017. - xxii, 401 p. :ill. ;24 cm.
Includes bibliographical references and index.
Part 1. Data. Organizing data : vantage, domain, action, and validity -- Vantage : understanding sensor placement in networks -- Sensors in the network domain -- Data in the service domain -- Sensors in the service domain -- Data and sensors in the host domain -- Data and sensors in the active domain -- Part 2. Tools. Getting data in one place -- The SiLK suite -- Reference and lookup : tools for figuring out who someone is -- Part 3. Analytics. Exploratory data analysis and visualization -- On analyzing text -- On fumbling -- On volume and time -- On graphs -- On insider threat -- On threat intelligence -- Application identification -- On network mapping -- On working with Ops.
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. -- Provided by publisher.
ISBN: 9781491962848 (pbk.) :NT1541Subjects--Topical Terms:
933331
Communication
--Network analysis.
LC Class. No.: TK5105.59 / .C64 2017
Dewey Class. No.: 005.8
Network security through data analysis : = from data to action /
LDR
:02052nam 2200193 a 4500
001
891726
008
181002s2017 maua b 001 0 eng d
020
$a
9781491962848 (pbk.) :
$c
NT1541
020
$a
1491962844 (pbk.)
035
$a
4
050
0 0
$a
TK5105.59
$b
.C64 2017
082
0 4
$a
005.8
$2
23
100
1
$a
Collins, Michael
$q
(Michael Patrick)
$3
1150702
245
1 0
$a
Network security through data analysis :
$b
from data to action /
$c
Michael Collins.
246
3 0
$a
from data to action
250
$a
2nd ed.
260
$a
Boston :
$b
O'Reilly Media,
$c
c2017.
300
$a
xxii, 401 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
505
0
$a
Part 1. Data. Organizing data : vantage, domain, action, and validity -- Vantage : understanding sensor placement in networks -- Sensors in the network domain -- Data in the service domain -- Sensors in the service domain -- Data and sensors in the host domain -- Data and sensors in the active domain -- Part 2. Tools. Getting data in one place -- The SiLK suite -- Reference and lookup : tools for figuring out who someone is -- Part 3. Analytics. Exploratory data analysis and visualization -- On analyzing text -- On fumbling -- On volume and time -- On graphs -- On insider threat -- On threat intelligence -- Application identification -- On network mapping -- On working with Ops.
520
$a
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. -- Provided by publisher.
650
0
$a
Communication
$x
Network analysis.
$3
933331
650
0
$a
Computer networks
$x
Security measures.
$3
555385
筆 0 讀者評論
全部
圖書館3F 書庫
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
E045184
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
005.8 C712 2017
一般使用(Normal)
在架
0
預約
1 筆 • 頁數 1 •
1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入