Network Security Through Data Analysis

上传:Trojan19 浏览: 27 推荐: 0 文件:PDF 大小:14.72MB 上传时间:2018-12-29 01:44:35 版权申诉
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios a nd techniques. It’s ideal for network administrators and operational security analysts familiar with scripting. Explore network, host, and service sensors for capturing security data Store data traffic with relational databases, graph databases, Redis, and Hadoop Use SiLK, the R language, and other tools for analysis and visualization Detect unusual phenomena through Exploratory Data Analysis (EDA) Identify significant structures in networks with graph analysis Determine the traffic that’s crossing service ports in a network Examine traffic volume and behavior to spot DDoS and database raids Get a step-by-step process for network mapping and inventory nd techniques. It’s ideal for network administrators and operational security analysts familiar with scripting. Explore network, host, and service sensors for capturing security data Store data traffic with relational databases, graph databases, Redis, and Hadoop Use SiLK, the R language, and other tools for analysis and visualization Detect unusual phenomena through Exploratory Data Analysis (EDA) Identify significant structures in networks with graph analysis Determine the traffic that’s crossing service ports in a network Examine traffic volume and behavior to spot DDoS and database raids Get a step-by-step process for network mapping and inventory
上传资源
用户评论
相关推荐
Network.Security.Through.Data.Analysis
Network.Security.Through.Data.Analysis 英文原版 pdf
PDF
13.49MB
2020-07-27 23:33
Network Security Through Data Analysis无水印pdf
Network Security Through Data Analysis 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自
PDF
0B
2018-12-29 01:33
Network Security through Data Analysis From Data to Action2nd
Network Security through Data Analysis From Data to Action(2nd) 英文无水印pdf 第2版 pdf。。。
RAR
0B
2018-12-11 05:45
Network Security through Data Analysis From Data to Action2nd epub
Network Security through Data Analysis From Data to Action(2nd) 英文epub 第2版 本资源转载自网络,如有侵权,请联系上传者或csdn
EPUB
0B
2018-12-29 01:37
Network Security Through Data Analysis From Data to Action2nd Edition pdf
Traditionalintrusiondetectionandlogfileanalysisarenolongerenoughtoprotecttoday’scomplexnetworks.Inth
PDF
0B
2019-06-01 13:19
英文原版Network Security Through Data Analysis1st Edition
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex
RAR
10.69MB
2020-08-07 15:18
Network Security through Data Analysis From Data to Action2nd azw3
Network Security through Data Analysis From Data to Action(2nd) 英文azw3 第2版 本资源转载自网络,如有侵权,请联系上传者或csdn
AZW3
0B
2018-12-29 01:29
Network Security through Data Analysis From Data to Action2nd无水印pdf
Network Security through Data Analysis From Data to Action(2nd) 英文无水印pdf 第2版 pdf所有页面使用FoxitReader和PD
PDF
0B
2018-12-29 01:44
Network Security through Data Analysis From Data to Action2nd无水印原版pdf
Network Security through Data Analysis From Data to Action(2nd) 英文无水印原版pdf 第2版 pdf所有页面使用FoxitReader、
PDF
0B
2018-12-29 01:31
Social Network Data Analysis
社会网络分析书籍,综述了社会网络分析的最新进展
PDF
0B
2019-06-01 13:19
Network Security Analysis Tool开源
NSAT是一种快速,高度可配置的批量网络安全扫描程序,可处理50多种不同的服务和数百个漏洞。 它的主要优点是它的灵活性和可配置性。
TGZ
967KB
2021-05-10 16:53
Data Security Analysis in Cloud Environment
網路攻擊模式的模型......寫出很多的攻擊哦是
pdf
0B
2019-05-28 16:41
Statistical Analysis of Network Data Methods and Models
这是关于网络数据的统计分析的电子书,高清,最新版本,经典著作,英文版
PDF
0B
2019-07-31 19:43
Analysis of Microarray Data A Network Based Approach
Thisbookpresentsnovelapproachesforthestatisticalanalysisofmicroarraydata.Allthesemethodssharethecomm
PDF
0B
2020-06-08 20:41
Stochastic game net and applications in security analysis for enterprise network
Stochastic game theoretic framework has been used in many fields of networks with interactive behavi
PDF
768KB
2021-02-17 12:09