HOME > 상세정보

상세정보

Network security through data analysis : building situational awareness

Network security through data analysis : building situational awareness (5회 대출)

자료유형
단행본
개인저자
Collins, Michael.
서명 / 저자사항
Network security through data analysis : building situational awareness / Michael Collins.
발행사항
Sebastopol, CA ;   Beijing :   O'Reilly,   2014.  
형태사항
xvii, 325 p. : ill. ; 24 cm.
ISBN
9781449357900
일반주기
Includes index.  
일반주제명
Computer networks -- Security measures. Communication -- Network analysis.
000 00750namuu2200229 a 4500
001 000045810322
005 20140912084659
008 140911s2014 caua 001 0 eng
020 ▼a 9781449357900
040 ▼a 211009 ▼c 211009 ▼d 211009
082 0 4 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b C712n
100 1 ▼a Collins, Michael.
245 1 0 ▼a Network security through data analysis : ▼b building situational awareness / ▼c Michael Collins.
260 ▼a Sebastopol, CA ; ▼a Beijing : ▼b O'Reilly, ▼c 2014.
300 ▼a xvii, 325 p. : ▼b ill. ; ▼c 24 cm.
500 ▼a Includes index.
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Communication ▼x Network analysis.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 C712n 등록번호 121230751 (5회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it.

Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting.

  • Explore network, host, and service sensors for capturing security data
  • Store data traffic with relational databases, graph databases, Redis, and Hadoop
  • Use SiLK, the R language, and other tools for analysis and visualization
  • Detect unusual phenomena through Exploratory Data Analysis (EDA)
  • Identify significant structures in networks with graph analysis
  • Determine the traffic that’s crossing service ports in a network
  • Examine traffic volume and behavior to spot DDoS and database raids
  • Get a step-by-step process for network mapping and inventory



정보제공 : Aladin

저자소개

MICHAEL COLLINS(지은이)

<현대디자인의 이해>

정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)