Network security through data analysis : (Record no. 13574)

MARC details
000 -LEADER
fixed length control field 01823nam a2200229Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520102718.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781449357900
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK 5105.59 .C65 2014
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Collins, Michael.
Relator term author
245 #0 - TITLE STATEMENT
Title Network security through data analysis :
Remainder of title building situational awareness /
Statement of responsibility, etc. Michael Collins
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Sebastopol, California :
Name of publisher, distributor, etc. O'Reilly Media, Incorporated,
Date of publication, distribution, etc. c2014
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 325 pages :
Other physical details illustrations ;
Dimensions 23 cm.
365 ## - TRADE PRICE
Price amount USD32.51
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Part 1. Data -- 1. Sensors and detectors: an introduction -- 2. Network sensors -- 3. Host and service sensors: logging traffic at the source -- 4. Data storage for analysis: relational databases, big data and other options -- Part 2. Tools -- 5. The SiLK suite -- 6. An introduction to R for security analysts -- 7. Classification and event tools: IDS, AV, and SEM -- 8. Reference and lookup: tools for figuring out who someone is -- 9. More tools -- Part 3. Analytics -- 10. Exploratory data analysis and visualization -- 11. On fumbling -- 12. Volume and time analysis -- 13. Graph analysis -- 14. Application identification -- 15. Network mapping.
520 ## - SUMMARY, ETC.
Summary, etc. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER NETWORKS -- SECURITY MEASURES
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Gen. Ed. - CCIT LRC - Graduate Studies National University - Manila General Circulation 04/15/2015 Purchased - Amazon 32.51   GC TK 5105.59 .C65 2014 c.2 NULIB000011333 05/20/2025 c.2 05/20/2025 Books