|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn922539356 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150929s2016 inua o 001 0 eng d |
010 |
|
|
|a 2015945876
|
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d DEBBG
|d DEBSZ
|d COO
|d YDX
|d CEF
|d OCLCQ
|d UAB
|d CZL
|d OCLCO
|d VT2
|d UKAHL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1005298812
|a 1153026647
|
020 |
|
|
|a 9780134033549
|
020 |
|
|
|a 013403354X
|
020 |
|
|
|a 1587144387
|
020 |
|
|
|a 9781587144387
|
020 |
|
|
|a 0134033515
|
020 |
|
|
|a 9780134033518
|
020 |
|
|
|z 9781587144387
|
029 |
1 |
|
|a DEBBG
|b BV043020250
|
029 |
1 |
|
|a DEBSZ
|b 45569821X
|
029 |
1 |
|
|a GBVCP
|b 841150958
|
035 |
|
|
|a (OCoLC)922539356
|z (OCoLC)1005298812
|z (OCoLC)1153026647
|
037 |
|
|
|a CL0500000652
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
082 |
1 |
4 |
|a 005.8
|q OCoLC
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Santos, Omar,
|e author.
|
245 |
1 |
0 |
|a Network security with NetFlow and IPFIX :
|b big data analytics for information security /
|c Omar Santos.
|
264 |
|
1 |
|a Indianapolis, Indiana :
|b Cisco Press,
|c [2016]
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Networking technology series
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed September 25, 2015).
|
500 |
|
|
|a "Security"--Cover.
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today's world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Network Security with NetFlow and IPFIX is a key resource for introducing yourself to and understanding the power behind the Cisco NetFlow solution. Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of numerous books including the CCNA Security 210-260 Official Cert Guide, details the importance of NetFlow and demonstrates how it can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This book also examines NetFlow's potential as a powerful network security tool. Network Security with NetFlow and IPFIX explores everything you need to know to fully understand and implement the Cisco Cyber Threat Defense Solution. It also provides detailed configuration and troubleshooting guidance, sample configurations with depth analysis of design scenarios in every chapter, and detailed case studies with real-life scenarios. You can follow Omar on Twitter: @santosomar NetFlow and IPFIX basics Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow Commercial and Open Source Software Packages Big Data Analytics tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive, HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry Sources for Big Data Analytics for Cyber Security Understanding big data scalability Big data analytics in the Internet of everything Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow Real-world case studies.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Management.
|
650 |
|
0 |
|a Computer networks
|x Monitoring.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Gestion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Surveillance.
|
650 |
|
7 |
|a Computer networks
|x Management
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Monitoring
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
830 |
|
0 |
|a Cisco Press networking technology series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780134033549/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH41026999
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18097173
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14856302
|
994 |
|
|
|a 92
|b IZTAP
|