Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence. Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities. "Security Data Visualization" is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and how worms and viruses propagate. You'll learn how to use visualization techniques to: Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document Gain insight into large amounts of low-level packet data Identify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacks View the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespread network attacks View and analyze firewall and intrusion detectionsystem (IDS) logs Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective
"Sinopsis" puede pertenecer a otra edición de este libro.
Gregory Conti, an Assistant Professor of Computer Science at the U.S. Military Academy in West Point, N.Y., has been featured in IEEE Security and Privacy magazine, the Communications of the ACM, and IEEE Computer Graphics and Applications magazine. He has spoken at a wide range of academic and hacker conferences, including Black Hat, DEFCON and the Workshop on Visualization for Computer Security (VizSEC). Conti runs the open source security visualization project, RUMINT, http://www.rumint.org/.
"Sobre este título" puede pertenecer a otra edición de este libro.
GRATIS gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoEUR 3,69 gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoLibrería: Gulf Coast Books, Cypress, TX, Estados Unidos de America
paperback. Condición: Fair. Nº de ref. del artículo: 1593271433-4-34593840
Cantidad disponible: 1 disponibles
Librería: World of Books (was SecondSale), Montgomery, IL, Estados Unidos de America
Condición: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Nº de ref. del artículo: 00060825492
Cantidad disponible: 2 disponibles
Librería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
Paperback. Condición: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Nº de ref. del artículo: G1593271433I4N00
Cantidad disponible: 1 disponibles
Librería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America
Paperback. Condición: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Nº de ref. del artículo: G1593271433I3N00
Cantidad disponible: 1 disponibles
Librería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America
Paperback. Condición: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less. Nº de ref. del artículo: G1593271433I2N00
Cantidad disponible: 1 disponibles
Librería: Wonder Book, Frederick, MD, Estados Unidos de America
Condición: As New. Like New condition. A near perfect copy that may have very minor cosmetic defects. Nº de ref. del artículo: S19D-01198
Cantidad disponible: 1 disponibles
Librería: HPB-Red, Dallas, TX, Estados Unidos de America
paperback. Condición: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Nº de ref. del artículo: S_415908937
Cantidad disponible: 1 disponibles
Librería: Upward Bound Books, VALRICO, FL, Estados Unidos de America
Condición: good. Book is in good condition, including the original dust jacket, with no markings or highlighting inside. Nº de ref. del artículo: 59WS4H001KP9_ns
Cantidad disponible: 1 disponibles
Librería: agoodealofbooks, Ypsilanti, MI, Estados Unidos de America
paperback. Condición: Very Good. very clean softcover. no marks. clean text. solid binding. very light wear. ISBN matches listin Fast service with confirmation, no international or priority orders over 4lbs. Nº de ref. del artículo: mon0000178151
Cantidad disponible: 1 disponibles
Librería: Country House Library, Gloucester, GLOS, Reino Unido
paperback. Condición: Used; Very Good. Dispatched, from the UK, within 48 hours of ordering. Though second-hand, the book is still in very good shape. Minimal signs of usage may include very minor creasing on the cover or on the spine. Nº de ref. del artículo: CHL10431320
Cantidad disponible: 1 disponibles