Security Data Visualization pdf epub mobi txt 电子书 下载 2024


Security Data Visualization

简体网页||繁体网页
Greg Conti
No Starch Press
2007-10-01
244
USD 49.95
Paperback
9781593271435

图书标签: 信息安全  可视化  统计  安全可视化  原始/图形思维  book   


喜欢 Security Data Visualization 的读者还喜欢




点击这里下载
    


想要找书就要到 小哈图书下载中心
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

发表于2024-11-10

Security Data Visualization epub 下载 mobi 下载 pdf 下载 txt 电子书 下载 2024

Security Data Visualization epub 下载 mobi 下载 pdf 下载 txt 电子书 下载 2024

Security Data Visualization pdf epub mobi txt 电子书 下载 2024



图书描述

Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence. Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities. "Security Data Visualization" is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and how worms and viruses propagate. You'll learn how to use visualization techniques to: Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document Gain insight into large amounts of low-level packet data Identify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacks View the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespread network attacks View and analyze firewall and intrusion detectionsystem (IDS) logs Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective

Security Data Visualization 下载 mobi epub pdf txt 电子书

著者简介

Gregory Conti, an Assistant Professor of Computer Science at the U.S. Military Academy in West Point, N.Y., has been featured in IEEE Security and Privacy magazine, the Communications of the ACM, and IEEE Computer Graphics and Applications magazine. He has spoken at a wide range of academic and hacker conferences, including Black Hat, DEFCON and the Workshop on Visualization for Computer Security (VizSEC). Conti runs the open source security visualization project, RUMINT, http://www.rumint.org/.


图书目录


Security Data Visualization pdf epub mobi txt 电子书 下载
想要找书就要到 小哈图书下载中心
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

用户评价

评分

在google上刚读到第三章就需要付费了,在网上下了个第五章,目前感觉还可以,谁有PDF电子版?跪求。。。。

评分

在google上刚读到第三章就需要付费了,在网上下了个第五章,目前感觉还可以,谁有PDF电子版?跪求。。。。

评分

在google上刚读到第三章就需要付费了,在网上下了个第五章,目前感觉还可以,谁有PDF电子版?跪求。。。。

评分

在google上刚读到第三章就需要付费了,在网上下了个第五章,目前感觉还可以,谁有PDF电子版?跪求。。。。

评分

在google上刚读到第三章就需要付费了,在网上下了个第五章,目前感觉还可以,谁有PDF电子版?跪求。。。。

读后感

评分

评分

评分

评分

评分

类似图书 点击查看全场最低价

Security Data Visualization pdf epub mobi txt 电子书 下载 2024


分享链接









相关图书




本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

友情链接

© 2024 qciss.net All Rights Reserved. 小哈图书下载中心 版权所有