Cargando…

Network security through data analysis : from data to action /

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Collins, Michael (Michael Patrick) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2017.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1004395162
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170920s2017 caua ob 001 0 eng d
010 |a  2018304668 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d YDX  |d N$T  |d TEFOD  |d TOH  |d STF  |d MERER  |d OCLCF  |d OCLCQ  |d MNW  |d CEF  |d KSU  |d UAB  |d NRC  |d OCLCQ  |d UKAHL  |d ERF  |d OCLCO  |d OCLCQ  |d CZL  |d VT2  |d UK7LJ  |d OCLCO  |d OCLCA  |d OCLCQ  |d OCLCO 
019 |a 1003284697  |a 1003492585  |a 1003774629  |a 1103269989  |a 1202548975  |a 1240535641  |a 1295610051 
020 |a 9781491962817 
020 |a 149196281X 
020 |a 9781491962794 
020 |a 1491962798 
020 |z 9781491962848 
020 |z 1491962844 
020 |a 1491962836 
020 |a 9781491962831 
029 1 |a GBVCP  |b 1014936519 
029 1 |a AU@  |b 000067110408 
035 |a (OCoLC)1004395162  |z (OCoLC)1003284697  |z (OCoLC)1003492585  |z (OCoLC)1003774629  |z (OCoLC)1103269989  |z (OCoLC)1202548975  |z (OCoLC)1240535641  |z (OCoLC)1295610051 
037 |a CL0500000892  |b Safari Books Online 
050 4 |a TK5105.59 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Collins, Michael  |q (Michael Patrick),  |e author. 
245 1 0 |a Network security through data analysis :  |b from data to action /  |c Michael Collins. 
250 |a Second edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2017. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Online resource; title from title page (Safari, viewed September 18, 2017). 
500 |a Previous edition published: 2014. 
504 |a Includes bibliographical references and index. 
505 0 |a I. Data. Organizing data: vantage, domain, action, and validity -- Vantage: understanding sensor placement in networks -- Sensors in the network domain -- Data in the service domain -- Sensors in the service domain -- Data and sensors in the host domain -- Data and sensors in the active domain -- II. Tools. Getting data in one place -- The SiLK suite -- Reference and Lookup: tools for figuring out who someone is -- III. Analytics. Exploratory data analysis and visualization -- On analyzing text -- On Fumbling -- On volume and time -- On graphs -- On insider threat -- On threat intelligence -- Application identification -- On network mapping -- On working with Ops -- Conclusions. 
520 |a Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Communication  |x Network analysis. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Communication  |x Analyse de réseau. 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Communication  |x Network analysis  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
776 0 8 |i Print version:  |z 1491962844  |z 9781491962848  |w (OCoLC)966378503 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491962831/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33352916 
938 |a EBSCOhost  |b EBSC  |n 1590702 
938 |a YBP Library Services  |b YANK  |n 14787908 
994 |a 92  |b IZTAP