MARC details
000 -LEADER |
fixed length control field |
01823nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520102718.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781449357900 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK 5105.59 .C65 2014 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Collins, Michael. |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Network security through data analysis : |
Remainder of title |
building situational awareness / |
Statement of responsibility, etc. |
Michael Collins |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Sebastopol, California : |
Name of publisher, distributor, etc. |
O'Reilly Media, Incorporated, |
Date of publication, distribution, etc. |
c2014 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 325 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm. |
365 ## - TRADE PRICE |
Price amount |
USD32.51 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part 1. Data -- 1. Sensors and detectors: an introduction -- 2. Network sensors -- 3. Host and service sensors: logging traffic at the source -- 4. Data storage for analysis: relational databases, big data and other options -- Part 2. Tools -- 5. The SiLK suite -- 6. An introduction to R for security analysts -- 7. Classification and event tools: IDS, AV, and SEM -- 8. Reference and lookup: tools for figuring out who someone is -- 9. More tools -- Part 3. Analytics -- 10. Exploratory data analysis and visualization -- 11. On fumbling -- 12. Volume and time analysis -- 13. Graph analysis -- 14. Application identification -- 15. Network mapping. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER NETWORKS -- SECURITY MEASURES |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |