Security Data Visualization: Graphical Techniques for Network Analysis
Greg Conti
Sold by ThriftBooks-Dallas, Dallas, TX, U.S.A.
AbeBooks Seller since July 2, 2009
Used - Soft cover
Condition: Used - Very good
Quantity: 1 available
Add to basketSold by ThriftBooks-Dallas, Dallas, TX, U.S.A.
AbeBooks Seller since July 2, 2009
Condition: Used - Very good
Quantity: 1 available
Add to basketMay have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Seller Inventory # G1593271433I4N00
Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence.
Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities.
Security Data Visualization is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and how worms and viruses propagate.
You'll learn how to use visualizationtechniques to:
Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective
Greg Conti, an Assistant Professor of Computer Science at the U.S. Military Academy in West Point, N.Y., has been featured in IEEE Security and Privacy magazine, the Communications of the ACM, and IEEE Computer Graphics and Applications magazine. He has spoken at a wide range of academic and hacker conferences, including Black Hat, DEFCON and the Workshop on Visualization for Computer Security (VizSEC). Conti runs the open source security visualization project, RUMINT, http://www.rumint.org/.
"About this title" may belong to another edition of this title.
We guarantee each book that we send you. If you have any problems, please contact
our dedicated customer service department. They will do everything possible to
ensure you are happy with your order.
All domestic Standard shipments are distributed from our warehouses by OSM, then handed off to the USPS for final delivery.
2-Day Shipping is delivered by FedEx, which does not deliver to PO boxes.
International shipments are tendered to the local postal service in the destination country for final delivery – We do not use courier services for international deliveries.
| Order quantity | 4 to 8 business days | 4 to 8 business days |
|---|---|---|
| First item | US$ 0.00 | US$ 0.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.