𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Network security through data analysis: from data to action

✍ Scribed by Collins, Michael


Publisher
OReilly Media, Inc.
Year
2017;2014
Tongue
English
Edition
Second edition
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Subjects


Communication / Network analysis;Communication--Network analysis;Computer networks / Security measures;Computer networks--Security measures;COMPUTERS / Security / Networking;Communication -- Network analysis;Computer networks -- Security measures


πŸ“œ SIMILAR VOLUMES


Network Security Through Data Analysis:
✍ Michael Collins πŸ“‚ Library πŸ“… 2017 πŸ› O’Reilly Media 🌐 English

<div><p>Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing netwo

Network Security Through Data Analysis:
✍ Michael Collins πŸ“‚ Library πŸ“… 2017 πŸ› O’Reilly Media 🌐 English

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traff

Network Security Through Data Analysis:
✍ Collins, Michael πŸ“‚ Library πŸ“… 2017 πŸ› O'Reilly Media, Incorporated 🌐 English

Copyright; Table of Contents; Preface; Audience; Contents of This Book; Changes Between Editions; Conventions Used in This Book; Using Code Examples; O'Reilly Safari; How to Contact Us; Acknowledgments; Part I. Data; Chapter 1. Organizing Data: Vantage, Domain, Action, and Validity; Domain; Vantage;

Network Security Through Data Analysis:
✍ Michael Collins πŸ“‚ Library πŸ“… 2014 πŸ› O'Reilly Media 🌐 English

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network

Network Security Through Data Analysis:
✍ Michael Collins πŸ“‚ Library πŸ“… 2014 πŸ› O'Reilly Media 🌐 English

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network

Network Security Through Data Analysis:
✍ Michael Collins πŸ“‚ Library πŸ“… 2014 πŸ› O'Reilly Media 🌐 English

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network