Editore: O'Reilly Media, Incorporated, 2014
ISBN 10: 1449357903 ISBN 13: 9781449357900
Lingua: Inglese
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Good. Used book that is in clean, average condition without any missing pages.
Editore: O'Reilly Media, Incorporated, 2014
ISBN 10: 1449357903 ISBN 13: 9781449357900
Lingua: Inglese
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Used book that is in clean, average condition without any missing pages.
Da: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Da: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condizione: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Da: Bay State Book Company, North Smithfield, RI, U.S.A.
Condizione: very_good.
Editore: O'Reilly Media, Incorporated, 2014
ISBN 10: 1449357903 ISBN 13: 9781449357900
Lingua: Inglese
Da: Better World Books Ltd, Dunfermline, Regno Unito
EUR 7,07
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: Very Good. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Da: HPB-Ruby, Dallas, TX, U.S.A.
paperback. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Condizione: As New. Like New condition. 2nd edition. A near perfect copy that may have very minor cosmetic defects.
paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
EUR 19,28
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
EUR 17,76
Quantità: 1 disponibili
Aggiungi al carrelloSoft cover. Condizione: As New. 2nd Edition. bumbed corner.
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New.
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Network Security Through Data Analysis: From Data to Action. Book.
Da: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condizione: New. 2nd Edition. Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition.
Da: Lakeside Books, Benton Harbor, MI, U.S.A.
Condizione: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New.
Paperback. Condizione: New. Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques.
Da: Phatpocket Limited, Waltham Abbey, HERTS, Regno Unito
EUR 36,36
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions.
Condizione: new.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 41,84
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 44,82
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: New.
EUR 62,61
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques.
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
EUR 51,78
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. 2017. 2nd Edition. Paperback. . . . . .
EUR 44,83
Quantità: 2 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days.
Da: Toscana Books, AUSTIN, TX, U.S.A.
Paperback. Condizione: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks.
Condizione: New. 2017. 2nd Edition. Paperback. . . . . . Books ship from the US and Ireland.
Da: Revaluation Books, Exeter, Regno Unito
EUR 62,10
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 2nd edition. 401 pages. 9.25x7.00x1.00 inches. In Stock.
EUR 48,99
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques.
EUR 49,21
Quantità: Più di 20 disponibili
Aggiungi al carrelloKartoniert / Broschiert. Condizione: New. Traditional intrusion detection and logfile analysis are no longer enough to protect today s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools.