|
|
|
|
LEADER |
02281nmm a2200349 u 4500 |
001 |
EB001936752 |
003 |
EBX01000000000000001099654 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 1449357903
|
050 |
|
4 |
|a TK5105.59
|
100 |
1 |
|
|a Collins, Michael
|
245 |
0 |
0 |
|a Network security through data analysis
|b building situational awareness
|c Michael Collins
|
260 |
|
|
|a Sebastopol, CA
|b O'Reilly Media
|c 2014
|
300 |
|
|
|a 1 volume
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Data: Sensors and detectors: an introduction -- Network sensors -- Host and service sensors: logging traffic at the source -- Data storage for analysis: relational databases, big data, and other options -- Tools: The SiLK suite -- An introduction to R for security analysts -- Classification and event tools: IDS, AV, and SEM -- Reference and lookup: tools for figuring out who someone is -- More tools -- Analytics: Exploratory data analysis and visualization -- On fumbling -- Volume and time analysis -- Graph analysis -- Application identification -- Network mapping
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Communication / Network analysis / fast
|
653 |
|
|
|a Communication / Analyse de réseau
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Communication / Network analysis / http://id.loc.gov/authorities/subjects/sh85029031
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 9781449357900
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781449357894/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques
|