Seller: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Published by O'Reilly Media, Incorporated, 2014
ISBN 10: 1449357903 ISBN 13: 9781449357900
Language: English
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Good. Used book that is in clean, average condition without any missing pages.
Published by O'Reilly Media, Incorporated, 2014
ISBN 10: 1449357903 ISBN 13: 9781449357900
Language: English
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. Used book that is in clean, average condition without any missing pages.
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Seller: Goodwill of Silicon Valley, SAN JOSE, CA, U.S.A.
Condition: acceptable. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Acceptable condition! Any other included accessories are also in Acceptable condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear such as cover tears discoloration, staining, marks, scuffs, etc. All pages intact.
Published by O'Reilly Media, Incorporated, 2014
ISBN 10: 1449357903 ISBN 13: 9781449357900
Language: English
Seller: Better World Books Ltd, Dunfermline, United Kingdom
US$ 8.04
Convert currencyQuantity: 2 available
Add to basketCondition: Very Good. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Condition: As New. Like New condition. 2nd edition. A near perfect copy that may have very minor cosmetic defects.
Seller: medimops, Berlin, Germany
US$ 23.69
Convert currencyQuantity: 1 available
Add to basketCondition: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present.
US$ 20.00
Convert currencyQuantity: 1 available
Add to basketSoft cover. Condition: As New. 2nd Edition. bumbed corner.
Condition: new.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Published by O'Reilly Media 10/2/2017, 2017
ISBN 10: 1491962844 ISBN 13: 9781491962848
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Network Security Through Data Analysis: From Data to Action. Book.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: Lakeside Books, Benton Harbor, MI, U.S.A.
US$ 40.76
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Seller: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condition: New. 2nd Edition. Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
US$ 44.48
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: California Books, Miami, FL, U.S.A.
Condition: New.
Paperback. Condition: New. Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques.
Seller: Phatpocket Limited, Waltham Abbey, HERTS, United Kingdom
US$ 51.10
Convert currencyQuantity: 2 available
Add to basketCondition: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 46.70
Convert currencyQuantity: 2 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 52.27
Convert currencyQuantity: 2 available
Add to basketCondition: New.
Published by O?Reilly Media, Inc, USA, 2017
ISBN 10: 1491962844 ISBN 13: 9781491962848
Language: English
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
US$ 62.00
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. 2017. 2nd Edition. Paperback. . . . . .
US$ 74.38
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: New. Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques.
Seller: Toscana Books, AUSTIN, TX, U.S.A.
Paperback. Condition: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks.
Published by O'Reilly Media, Inc, USA, 2017
ISBN 10: 1491962844 ISBN 13: 9781491962848
Language: English
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
US$ 52.28
Convert currencyQuantity: 2 available
Add to basketPaperback / softback. Condition: New. New copy - Usually dispatched within 4 working days.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 67.35
Convert currencyQuantity: 2 available
Add to basketCondition: New. In.
Published by O Reilly Media, Inc, USA, 2017
ISBN 10: 1491962844 ISBN 13: 9781491962848
Language: English
Seller: Kennys Bookstore, Olney, MD, U.S.A.
US$ 71.73
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. 2017. 2nd Edition. Paperback. . . . . . Books ship from the US and Ireland.
Published by Oreilly & Associates Inc, 2017
ISBN 10: 1491962844 ISBN 13: 9781491962848
Language: English
Seller: Revaluation Books, Exeter, United Kingdom
US$ 71.63
Convert currencyQuantity: 2 available
Add to basketPaperback. Condition: Brand New. 2nd edition. 401 pages. 9.25x7.00x1.00 inches. In Stock.
US$ 56.13
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques.
US$ 58.93
Convert currencyQuantity: Over 20 available
Add to basketKartoniert / Broschiert. Condition: New. Traditional intrusion detection and logfile analysis are no longer enough to protect today s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools.