SFr. 65.00
€ 65.00
BTC 0.0082
LTC 0.483
ETH 0.1219


bestellen

Artikel-Nr. 4195671


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:




Autor(en): 
  • Greg Conti
  • Security Data Visualization: Graphical Techniques for Network Analysis 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 3 Artikel!


    Übersicht
     
    Lieferstatus:   i.d.R. innert 14-24 Tagen versandfertig
    Veröffentlichung:  2007  
    Genre:  EDV / Informatik 
     
    Computersicherheit
    ISBN:  9781593271435 
    EAN-Code: 
    9781593271435 
    Verlag:  No Starch Press,US 
    Einband:  Kartoniert  
    Sprache:  English  
    Dimensionen:  H 236 mm / B 179 mm / D 19 mm 
    Gewicht:  748 gr 
    Seiten:  244 
    Illustration:  Illustrations (chiefly col.) 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:
    Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools—and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence.

    Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities.

    Security Data Visualization is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior—like how vulnerabilities are exploited and how worms and viruses propagate.

    You'll learn how to use visualization techniques to:
    – Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT
    – See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document
    – Gain insight into large amounts of low-level packet data
    – Identify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacks
    – View the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespread network attacks
    – View and analyze firewall and intrusion detection system (IDS) logs

    Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective.
      



    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Google Plus-Page Google+ | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2018
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2018