Network security through data analysis : building situational awareness / Michael Collins
Material type:
- 9781449357900
- TK 5105.59 .C65 2014

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Mobile and Web Applications | GC TK 5105.59 .C65 2014 c.1 (Browse shelf(Opens below)) | c.1 | Available | NULIB000009211 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Mobile and Web Applications Close shelf browser (Hides shelf browser)
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC TK 5105.7 .M33 1994 Local area networks : new technologies, emerging standards / | GC TK 5105.7 .M378 1994 Local area networks : architectures and implementations / | GC TK 5105.59 .C43 2011 Cryptography and network security / | GC TK 5105.59 .C65 2014 c.1 Network security through data analysis : building situational awareness / | GC TK 5105.59 .S33 2011 Hacking exposed web applications : web application security secrets and solutions / | GC TK 5105.62 .C43 2017 Network functions virtualization (NFV) with a touch of SDN / | GC TK 5105.543 .G73 2008 c.1 Routing Protocols and Concepts CCNA Exploration Companion Guide / |
Includes bibliographical references and index.
Part 1. Data -- 1. Sensors and detectors: an introduction -- 2. Network sensors -- 3. Host and service sensors: logging traffic at the source -- 4. Data storage for analysis: relational databases, big data and other options -- Part 2. Tools -- 5. The SiLK suite -- 6. An introduction to R for security analysts -- 7. Classification and event tools: IDS, AV, and SEM -- 8. Reference and lookup: tools for figuring out who someone is -- 9. More tools -- Part 3. Analytics -- 10. Exploratory data analysis and visualization -- 11. On fumbling -- 12. Volume and time analysis -- 13. Graph analysis -- 14. Application identification -- 15. Network mapping.
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques.
There are no comments on this title.