Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence. Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities. "Security Data Visualization" is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and how worms and viruses propagate. You'll learn how to use visualization techniques to: Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document Gain insight into large amounts of low-level packet data Identify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacks View the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespread network attacks View and analyze firewall and intrusion detectionsystem (IDS) logs Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Greg Conti, an Assistant Professor of Computer Science at the U.S. Military Academy in West Point, N.Y., has been featured in IEEE Security and Privacy magazine, the Communications of the ACM, and IEEE Computer Graphics and Applications magazine. He has spoken at a wide range of academic and hacker conferences, including Black Hat, DEFCON and the Workshop on Visualization for Computer Security (VizSEC). Conti runs the open source security visualization project, RUMINT, http://www.rumint.org/.
Acknowledgments Introduction Chapter 1: An Overview of Information Visualization Chapter 2: The Beauty of Binary File Visualization Chapter 3: Port Scan Visualization Chapter 4: Vulnerability Assessment and Exploitation Chapter 5: One Night on My ISP Chapter 6: A Survey of Security Visualization Chapter 7: Firewall Log Visualization Chapter 8: Intrusion Detection Log Visualization Chapter 9: Attacking and Defending Visualization Systems Chapter 10: Creating a Security Visualization System Chapter 11: Unexplored Territory Chapter 12: Teaching Yourself
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 17,53 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 26,83 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: Better World Books: West, Reno, NV, U.S.A.
Condizione: Very Good. 1st Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 16558017-6
Quantità: 1 disponibili
Da: WeBuyBooks, Rossendale, LANCS, Regno Unito
Condizione: Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. Ex library copy with usual stamps & stickers. Codice articolo wbs8775570600
Quantità: 1 disponibili
Da: Wonder Book, Frederick, MD, U.S.A.
Condizione: As New. Like New condition. A near perfect copy that may have very minor cosmetic defects. Codice articolo S19D-01198
Quantità: 1 disponibili
Da: avelibro OHG, Dinkelscherben, Germania
8°, Broschiert. Condizione: Sehr gut. 272 Seiten : Ausgetragenes Bibliotheksexemplar, fast top erhalten B16-01-01I Sprache: Englisch Gewicht in Gramm: 747. Codice articolo 1883902
Quantità: 1 disponibili
Da: Toscana Books, AUSTIN, TX, U.S.A.
Paperback. Condizione: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Codice articolo Scanned1593271433
Quantità: 1 disponibili
Da: Upward Bound Books, VALRICO, FL, U.S.A.
Condizione: Good. Book is in good condition, including the original dust jacket, with no markings or highlighting inside. Codice articolo 59WS4H001KP9_ns
Quantità: 1 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_413491501
Quantità: 1 disponibili
Da: BennettBooksLtd, North Las Vegas, NV, U.S.A.
paperback. Condizione: New. In shrink wrap. Looks like an interesting title! Codice articolo Q-1593271433
Quantità: 1 disponibili
Da: dsmbooks, Liverpool, Regno Unito
Paperback. Condizione: Very Good. Very Good. book. Codice articolo D7S9-1-M-1593271433-2
Quantità: 1 disponibili
Da: PAPER CAVALIER UK, London, Regno Unito
Condizione: very good. Gently used. May include previous owner's signature or bookplate on the front endpaper, sticker on back and/or remainder mark on text block. Codice articolo 9781593271435-3
Quantità: 1 disponibili