English Deutsch Français 简体中文 繁體中文
Book123, Download eBooks for Free - Anytime! Submit your article

Categories

Share With Friends



Like Book123?! Give us +1

Archive by Date

Search Tag

Newest

Useful Links


Technical Security Data Visualization:Graphical Techniques for Network Analysis

Posted on 2010-04-10




Name:Technical Security Data Visualization:Graphical Techniques for Network Analysis
ASIN/ISBN:1593271433
Language:English
   Technical Security Data Visualization:Graphical Techniques for Network Analysis

Free Download Now     Free register and download UseNet downloader, then you can FREE Download from UseNet.

    Download without Limit " Technical Security Data Visualization:Graphical Techniques for Network Analysis " from UseNet for FREE!


Product Description

Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence. Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities. . Security Data Visualization is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and how worms and viruses propagate. . You'll learn how to use visualization techniques to:

. Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document Gain insight into large amounts of low-level packet data Identify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacks View the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespread network attacks View and analyze firewall and intrusion detection system (IDS) logs Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective

About the Author

Greg Conti, an Assistant Professor of Computer Science at the U.S. Military Academy in West Point, N.Y., has been featured in IEEE Security and Privacy magazine, the Communications of the ACM, and IEEE Computer Graphics and Applications magazine. He has spoken at a wide range of academic and hacker conferences, including Black Hat, DEFCON and the Workshop on Visualization for Computer Security (VizSEC). Conti runs the open source security visualization project, RUMINT, http://www.rumint.org/. .

Related Articles


Medical Data Analysis and Visualization in Genomics and Proteomics

Medical Data Analysis and Visualization in Genomics and Proteomics

Multimedia Computer Visualization: Graphics Techniques for Engineering and Scientific Analysis

Multimedia Computer Visualization: Graphics Techniques for Engineering and Scientific Analysis

Science/Engineering Data Analysis and Visualization in Genomics and Proteomics (Repost)

Science/Engineering Data Analysis and Visualization in Genomics and Proteomics (Repost)

Francisco Azuaje , Joaquin Dopazo ,"Data Analysis and Visualization in Genomics and Proteomics"Wiley | May 20, 2005 | ISBN: 0470094397 | 284 pages | PDF | 2.4 mbData Analysis and Visualization in Genomics and Proteomics is the first book ad ...

Technical Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)

Technical Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)

F. Azuaje (Editor), Data Analysis and Visualization in Genomics and Proteomics

F. Azuaje (Editor), Data Analysis and Visualization in Genomics and Proteomics

F. Azuaje (Editor), «Data Analysis and Visualization in Genomics and Proteomics» | «John Wiley & Sons» 2005 | 268 Pages | 2,5 Mb |PDF“Data Analysis and Visualization in Genomics and Proteomics is the first book addressing integrat ...

Technical Graphical Methods for Data Analysis

Technical Graphical Methods for Data Analysis

John M. Chambers, William S. Cleveland, Beat Kleiner, Paul A. Tukey, "Graphical Methods for Data Analysis" MgH | 1983 | ISBN: 053498052X, 0412052717 | 395 pages | Djvu | 2,9 MB Summary: Old But GoldRating: 4This book is an excellent int ...

Share this page with your friends now!
Text link
Forum (BBCode)
Website (HTML)
Tags:
Analysis   Network   Security   Data   Graphical  
 

DISCLAIMER:

This site does not store Technical Security Data Visualization:Graphical Techniques for Network Analysis on its server. We only index and link to Technical Security Data Visualization:Graphical Techniques for Network Analysis provided by other sites. Please contact the content providers to delete Technical Security Data Visualization:Graphical Techniques for Network Analysis if any and email us, we'll remove relevant links or contents immediately.

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?