• Tous les prix incluent la TVA.
Il ne reste plus que 4 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Network Security Through ... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Comme neuf | Détails
Vendu par SuperBookDeals..
État: D'occasion: Comme neuf
Commentaire: Remboursement garanti à 100%. Etat neuf, expédition rapide sous 4 à 14 jours ouvrés. Plus d'un millions de clients servis. Service à la clientèle en Français.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Network Security Through Data Analysis (Anglais) Broché – 14 février 2014

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 47,05
EUR 26,67 EUR 23,00

Offres spéciales et liens associés

Produits fréquemment achetés ensemble

  • Network Security Through Data Analysis
  • +
  • Rtfm: Red Team Field Manual
Prix total: EUR 53,30
Acheter les articles sélectionnés ensemble

Descriptions du produit

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It's ideal for network administrators and operational security analysts familiar with scripting. Explore network, host, and service sensors for capturing security data Store data traffic with relational databases, graph databases, Redis, and Hadoop Use SiLK, the R language, and other tools for analysis and visualization Detect unusual phenomena through Exploratory Data Analysis (EDA) Identify significant structures in networks with graph analysis Determine the traffic that's crossing service ports in a network Examine traffic volume and behavior to spot DDoS and database raids Get a step-by-step process for network mapping and inventory

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x97f79294) étoiles sur 5 8 commentaires
6 internautes sur 7 ont trouvé ce commentaire utile 
HASH(0x945ade28) étoiles sur 5 Network Security Through Data Analysis review 6 juillet 2014
Par Javier - Publié sur Amazon.com
Format: Broché
One of the goals of this book is achieving situational awareness or, to put it another way, an understanding of the environment you are operating in. This book is about collecting data and looking at networks in order to understand how the network is used.

The author mentions the target for this book are network administrators and operational security analyts. I would add networking students and hackers on the top of this target. The content is very easy to follow though.

The book is divided into three sections (data, tools and analytics). It contains a total of 15 self-contained chapters.

The data section (chapters 1-4) covers the way to collect, storage and organize data. This part discuss about sensors, the best place to set them, the tooling to interface them and the issues/solutions related to the vast amount of data generated.

The tool section (chatpers 5-9) keeps the focus on tools. It covers analysis, visualization and reporting aspects. Some of these tools are SiLK, R, Graphviz, nmap, Wireshark or netcat.

The analytics section (chapters 10-15) studies the nature of the networking traffic and how some mathematical and statistical models can be used to examine data. Among the different analysis you can find useful information related to DDoS attacks, scanning patterns or port correlations approaches.

This book is interesting. It is a great update in this topic and it faces the recent issue of ‘big data’ and massive analysis from a network security perspective.

At the same time, I found the jargon of the author a bit thick along some chapters. I guess it is the result of trying to generalize some concepts and techniques while he introduces concrete examples.

As mentioned, I think this book contains good stuff. It covers a broad spectrum of topics so it could be a great book to jump in this area too. The author makes a good job and he talks from experience.
9 internautes sur 12 ont trouvé ce commentaire utile 
HASH(0x9528a60c) étoiles sur 5 A guide to finding new threats in any secure operations center 7 mars 2014
Par KEVIN M NOBLE - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
The book takes considerable time to explain traffic in general, sensing traffic and the logistics around making sense of network data both at the simplistic and the next level of analysis. Anyone who has a solid understanding or working in network monitoring can skip ahead to the more interesting analysis techniques at each layer of traffic, using fundamental principals and visualization to find potential threats.

The exploration of volume and time analysis was particularly interesting to me as I do similar work however, only goes far enough to give the reader or anyone willing to try the code presented in the book an idea of what is to be expected. Probably wise of the author not to go too deep and demonstrate a wide range of analysis missing in data centers and security operations.

I found the book to insightful and useful and good for anyone looking to make the leap to the higher echelons of detection.
4 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x94640b28) étoiles sur 5 Informative at all career levels 17 juin 2014
Par Jason A Rafail - Publié sur Amazon.com
Format: Broché
To be upfront and open, I've known Michael for a number of years and worked with him at the CERT/CC. He is a brilliant analyst and has always been on the cutting edge of Network Analysis. His book is a nice blend of the basic principles and more advanced research techniques that few security analysts pursue. As people have said already, this is a comprehensive book that takes a look at Network Security from the basics into some of the often not thought about aspects. There are the basics of flow analysis and monitoring to start the reader off with a solid foundation, then the later chapters delve into true analysis. Most security professionals grasp the basics for interpretation of the flows to see trends and attacks, but few go further into the techniques for analysis of the packets to gain deeper intelligence into potential motives and attempts made against systems. This books takes the readers from their comfortable basics and introduces these thought processes and techniques in an understandable and easy to follow way. With examples and explanations to help develop this knowledge.

This isn't another user guide for existing monitor and alerting software, it is a tool for security analysts to use when actively trying to understand the overwhelming and generalized information they gather through such tools. With the examples and details provided, network engineers can dig deeper to better understand the source of threats and desired targets on their network. There's more to Network Security than just responding to software alerts and this book provides a good foothold into the more advanced analysis.
1 internautes sur 1 ont trouvé ce commentaire utile 
HASH(0x97f79798) étoiles sur 5 One of the best netsec books that I've read 5 août 2015
Par mjw - Publié sur Amazon.com
Format: Broché Achat vérifié
One of the best netsec books that I've read, and one of the few available that is directly applicable to monitoring high throughput enterprise networks. The author works through a complete stack of network monitoring tasks from network fundamentals, sensor placement, packet capture, software, data aggregation, storage, correlation, and analysis. The author shows an impressive breadth of knowledge while also expertly adding surprising depth when it's relevant and useful. Most of the tools and techniques are free/open-source and practical. Many enterprise netsec professionals will benefit from this book and will likely find a few tools/techniques they can readily use.
4 internautes sur 6 ont trouvé ce commentaire utile 
HASH(0x94b2d36c) étoiles sur 5 Great guide 2 mai 2014
Par Timm McShane - Publié sur Amazon.com
Format: Broché Achat vérifié
Should be considered a gold standard for learning network security.
Breaks down the analysis problem effectively, clearly and simply. Starts from the beginning, allow new comers to get the full background needed to come up to speed rapidly.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?