Security Data Visualization pdf epub mobi txt 電子書 下載 2024


Security Data Visualization

簡體網頁||繁體網頁
Greg Conti
No Starch Press
2007-10-01
244
USD 49.95
Paperback
9781593271435

圖書標籤: 信息安全  可視化  統計  安全可視化  原始/圖形思維  book   


喜歡 Security Data Visualization 的讀者還喜歡




點擊這裡下載
    


想要找書就要到 小哈圖書下載中心
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

发表于2024-11-27

Security Data Visualization epub 下載 mobi 下載 pdf 下載 txt 電子書 下載 2024

Security Data Visualization epub 下載 mobi 下載 pdf 下載 txt 電子書 下載 2024

Security Data Visualization pdf epub mobi txt 電子書 下載 2024



圖書描述

Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence. Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities. "Security Data Visualization" is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and how worms and viruses propagate. You'll learn how to use visualization techniques to: Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document Gain insight into large amounts of low-level packet data Identify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacks View the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespread network attacks View and analyze firewall and intrusion detectionsystem (IDS) logs Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective

Security Data Visualization 下載 mobi epub pdf txt 電子書

著者簡介

Gregory Conti, an Assistant Professor of Computer Science at the U.S. Military Academy in West Point, N.Y., has been featured in IEEE Security and Privacy magazine, the Communications of the ACM, and IEEE Computer Graphics and Applications magazine. He has spoken at a wide range of academic and hacker conferences, including Black Hat, DEFCON and the Workshop on Visualization for Computer Security (VizSEC). Conti runs the open source security visualization project, RUMINT, http://www.rumint.org/.


圖書目錄


Security Data Visualization pdf epub mobi txt 電子書 下載
想要找書就要到 小哈圖書下載中心
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

用戶評價

評分

在google上剛讀到第三章就需要付費瞭,在網上下瞭個第五章,目前感覺還可以,誰有PDF電子版?跪求。。。。

評分

在google上剛讀到第三章就需要付費瞭,在網上下瞭個第五章,目前感覺還可以,誰有PDF電子版?跪求。。。。

評分

在google上剛讀到第三章就需要付費瞭,在網上下瞭個第五章,目前感覺還可以,誰有PDF電子版?跪求。。。。

評分

在google上剛讀到第三章就需要付費瞭,在網上下瞭個第五章,目前感覺還可以,誰有PDF電子版?跪求。。。。

評分

在google上剛讀到第三章就需要付費瞭,在網上下瞭個第五章,目前感覺還可以,誰有PDF電子版?跪求。。。。

讀後感

評分

評分

評分

評分

評分

類似圖書 點擊查看全場最低價

Security Data Visualization pdf epub mobi txt 電子書 下載 2024


分享鏈接





相關圖書




本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

友情鏈接

© 2024 qciss.net All Rights Reserved. 小哈圖書下載中心 版权所有