<div><p>Traditional intrusion detection and logfile analysis are no longer enough to protect todayβs complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing netwo
Network security through data analysis: from data to action
β Scribed by Collins, Michael
- Publisher
- OReilly Media, Inc.
- Year
- 2017;2014
- Tongue
- English
- Edition
- Second edition
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Subjects
Communication / Network analysis;Communication--Network analysis;Computer networks / Security measures;Computer networks--Security measures;COMPUTERS / Security / Networking;Communication -- Network analysis;Computer networks -- Security measures
π SIMILAR VOLUMES
Traditional intrusion detection and logfile analysis are no longer enough to protect todayβs complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traff
Copyright; Table of Contents; Preface; Audience; Contents of This Book; Changes Between Editions; Conventions Used in This Book; Using Code Examples; O'Reilly Safari; How to Contact Us; Acknowledgments; Part I. Data; Chapter 1. Organizing Data: Vantage, Domain, Action, and Validity; Domain; Vantage;
Traditional intrusion detection and logfile analysis are no longer enough to protect todayβs complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. Youβll understand how your network
Traditional intrusion detection and logfile analysis are no longer enough to protect todayβs complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. Youβll understand how your network
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network