Commencez à lire Network Security Through Data Analysis sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Network Security Through Data Analysis: Building Situational Awareness
 
Agrandissez cette image
 

Network Security Through Data Analysis: Building Situational Awareness [Format Kindle]

Michael S Collins

Prix conseillé : EUR 24,71 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 41,57
Prix Kindle : EUR 17,30 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 24,27 (58%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 17,30  
Broché EUR 42,28  





Descriptions du produit

Présentation de l'éditeur

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it.

Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting.

  • Explore network, host, and service sensors for capturing security data
  • Store data traffic with relational databases, graph databases, Redis, and Hadoop
  • Use SiLK, the R language, and other tools for analysis and visualization
  • Detect unusual phenomena through Exploratory Data Analysis (EDA)
  • Identify significant structures in networks with graph analysis
  • Determine the traffic that’s crossing service ports in a network
  • Examine traffic volume and behavior to spot DDoS and database raids
  • Get a step-by-step process for network mapping and inventory

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 7055 KB
  • Nombre de pages de l'édition imprimée : 348 pages
  • Utilisation simultanée de l'appareil : Illimité
  • Editeur : O'Reilly Media; Édition : 1 (10 février 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00IB126JI
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Classement des meilleures ventes d'Amazon: n°134.624 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.4 étoiles sur 5  5 commentaires
7 internautes sur 8 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 A guide to finding new threats in any secure operations center 7 mars 2014
Par KEVIN M NOBLE - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
The book takes considerable time to explain traffic in general, sensing traffic and the logistics around making sense of network data both at the simplistic and the next level of analysis. Anyone who has a solid understanding or working in network monitoring can skip ahead to the more interesting analysis techniques at each layer of traffic, using fundamental principals and visualization to find potential threats.

The exploration of volume and time analysis was particularly interesting to me as I do similar work however, only goes far enough to give the reader or anyone willing to try the code presented in the book an idea of what is to be expected. Probably wise of the author not to go too deep and demonstrate a wide range of analysis missing in data centers and security operations.

I found the book to insightful and useful and good for anyone looking to make the leap to the higher echelons of detection.
4 internautes sur 4 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Network Security Through Data Analysis review 6 juillet 2014
Par Javier - Publié sur Amazon.com
Format:Broché
One of the goals of this book is achieving situational awareness or, to put it another way, an understanding of the environment you are operating in. This book is about collecting data and looking at networks in order to understand how the network is used.

The author mentions the target for this book are network administrators and operational security analyts. I would add networking students and hackers on the top of this target. The content is very easy to follow though.

The book is divided into three sections (data, tools and analytics). It contains a total of 15 self-contained chapters.

The data section (chapters 1-4) covers the way to collect, storage and organize data. This part discuss about sensors, the best place to set them, the tooling to interface them and the issues/solutions related to the vast amount of data generated.

The tool section (chatpers 5-9) keeps the focus on tools. It covers analysis, visualization and reporting aspects. Some of these tools are SiLK, R, Graphviz, nmap, Wireshark or netcat.

The analytics section (chapters 10-15) studies the nature of the networking traffic and how some mathematical and statistical models can be used to examine data. Among the different analysis you can find useful information related to DDoS attacks, scanning patterns or port correlations approaches.

This book is interesting. It is a great update in this topic and it faces the recent issue of ‘big data’ and massive analysis from a network security perspective.

At the same time, I found the jargon of the author a bit thick along some chapters. I guess it is the result of trying to generalize some concepts and techniques while he introduces concrete examples.

As mentioned, I think this book contains good stuff. It covers a broad spectrum of topics so it could be a great book to jump in this area too. The author makes a good job and he talks from experience.
3 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great guide 2 mai 2014
Par Timm McShane - Publié sur Amazon.com
Format:Broché|Achat vérifié
Should be considered a gold standard for learning network security.
Breaks down the analysis problem effectively, clearly and simply. Starts from the beginning, allow new comers to get the full background needed to come up to speed rapidly.
2 internautes sur 3 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Informative at all career levels 17 juin 2014
Par Jason A Rafail - Publié sur Amazon.com
Format:Broché
To be upfront and open, I've known Michael for a number of years and worked with him at the CERT/CC. He is a brilliant analyst and has always been on the cutting edge of Network Analysis. His book is a nice blend of the basic principles and more advanced research techniques that few security analysts pursue. As people have said already, this is a comprehensive book that takes a look at Network Security from the basics into some of the often not thought about aspects. There are the basics of flow analysis and monitoring to start the reader off with a solid foundation, then the later chapters delve into true analysis. Most security professionals grasp the basics for interpretation of the flows to see trends and attacks, but few go further into the techniques for analysis of the packets to gain deeper intelligence into potential motives and attempts made against systems. This books takes the readers from their comfortable basics and introduces these thought processes and techniques in an understandable and easy to follow way. With examples and explanations to help develop this knowledge.

This isn't another user guide for existing monitor and alerting software, it is a tool for security analysts to use when actively trying to understand the overwhelming and generalized information they gather through such tools. With the examples and details provided, network engineers can dig deeper to better understand the source of threats and desired targets on their network. There's more to Network Security than just responding to software alerts and this book provides a good foothold into the more advanced analysis.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 good read 31 août 2014
Par Drivel - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
I learned quite a bit. I feel like I need to take a course on statistical analysis in order to get the most out of the book, however.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique