|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn297574775 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090109s2009 njuabf ob 001 0 eng d |
010 |
|
|
|a 2008023598
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d TXI
|d CEF
|d OCLCQ
|d DEBSZ
|d C6I
|d OCLCQ
|d OCLCF
|d OCLCQ
|d XFF
|d OCLCQ
|d YDX
|d OCLCA
|d OCLCQ
|d UAB
|d OCLCQ
|d INARC
|d OCLCO
|d CZL
|d LVT
|d OCLCO
|d OCLCQ
|d UKAHL
|d OCLCO
|
019 |
|
|
|a 260481381
|a 428738527
|a 1005334230
|a 1083233177
|a 1302278906
|a 1355689493
|
020 |
|
|
|a 9780321585530
|
020 |
|
|
|a 0321585534
|
020 |
|
|
|a 9780321564306
|
020 |
|
|
|a 0321564308
|
020 |
|
|
|z 0321510100
|q (pbk. ;
|q alk. paper)
|
020 |
|
|
|z 9780321510105
|q (pbk. ;
|q alk. paper)
|
029 |
1 |
|
|a CHBIS
|b 006148560
|
029 |
1 |
|
|a CHVBK
|b 171190904
|
029 |
1 |
|
|a DEBSZ
|b 355406721
|
029 |
1 |
|
|a HEBIS
|b 291479405
|
029 |
1 |
|
|a NZ1
|b 14872036
|
035 |
|
|
|a (OCoLC)297574775
|z (OCoLC)260481381
|z (OCoLC)428738527
|z (OCoLC)1005334230
|z (OCoLC)1083233177
|z (OCoLC)1302278906
|z (OCoLC)1355689493
|
037 |
|
|
|a CL0500000030
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .M369 2009
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Marty, Raffael,
|d 1976-
|
245 |
1 |
0 |
|a Applied security visualization /
|c Raffael Marty.
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b Addison-Wesley,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xxiii, 523 pages, 16 unnumbered pages of plates) :
|b illustrations (some color), maps (some color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a "As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today's state-of-the-art data visualization techniques, you can gain a far deeper understanding of what's happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods." "In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You'll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance."--Jacket
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information visualization.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Visualisation de l'information.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Information visualization.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Information visualization
|2 fast
|
776 |
0 |
|
|z 0321510100
|
776 |
0 |
|
|z 9780321510105
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780321585530/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Internet Archive
|b INAR
|n appliedsecurityv0000mart
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14856844
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37824855
|
994 |
|
|
|a 92
|b IZTAP
|