Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, slerts, packet captures, and even binary files take time and effort to analyze using text-bases tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence. Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities. Security Data Visualization is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and hox worms and viruses propagate. You'll learn how to use visualization techniques to: - Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT - See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document - Gain insight into large amounts of low-level packed data - Identify and dissect port scans, Nessus vulnerability assessments, and Metaploid attacks - View the global spread of the Sony rookit, analyze antivirus effectiveness, and monitor widespread network attacks - View and analyze firewall and intrusion detection system (IDS) logs Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gregory Conti, an Assistant Professor of Computer Science at the U.S. Military Academy in West Point, N.Y., has been featured in IEEE Security and Privacy magazine, the Communications of the ACM, and IEEE Computer Graphics and Applications magazine. He has spoken at a wide range of academic and hacker conferences, including Black Hat, DEFCON and the Workshop on Visualization for Computer Security (VizSEC). Conti runs the open source security visualization project, RUMINT, http://www.rumint.org/.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G1593271433I4N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G1593271433I2N00
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. 1st Edition. Used book that is in clean, average condition without any missing pages. Artikel-Nr. 16213578-6
Anzahl: 1 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. illustrated edition. 272 pages. 9.25x7.00x1.00 inches. In Stock. Artikel-Nr. 1593271433
Anzahl: 1 verfügbar
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
Zustand: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has soft covers. In good all round condition. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,850grams, ISBN:9781593271435. Artikel-Nr. 9496856
Anzahl: 1 verfügbar