Security Data Visualization Graphical Techniques For Network Analysis(1st Edition)

Authors:

Greg Conti

Type:Hardcover/ PaperBack / Loose Leaf
Condition: Used/New

In Stock: 2 Left

Shipment time

Expected shipping within 2 - 3 Days
Access to 35 Million+ Textbooks solutions Free
Ask Unlimited Questions from expert AI-Powered Answers 30 Min Free Tutoring Session
7 days-trial

Total Price:

$0

List Price: $32.15 Savings: $32.15 (100%)
Access to 30 Million+ solutions
Ask 50 Questions from expert AI-Powered Answers 24/7 Tutor Help Detailed solutions for Security Data Visualization Graphical Techniques For Network Analysis

Price:

$9.99

/month

Book details

ISBN: 1593271433, 978-1593271435

Book publisher: No Starch Press

Book Price $0 : Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence.Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities.Security Data Visualization is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and how worms and viruses propagate.You'll learn how to use visualizationtechniques to:Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINTSee the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word documentGain insight into large amounts of low-level packet dataIdentify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacksView the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespread network attacksView and analyze firewall and intrusion detection system (IDS) logsSecurity visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective