000 01635cam a2200349Ia 4500
001 862760366
003 OCoLC
005 20220329020002.0
008 130918s2014 cc a 001 0 eng d
015 _aGBB3A1749
_2bnb
016 7 _a016537440
_2Uk
020 _a9789351105244
035 _a(OCoLC)862760366
_z(OCoLC)830813801
_z(OCoLC)832259934
040 _aUKMGB
_beng
_cUKMGB
_dOCLCO
_dYBM
_dYDXCP
_dBTCTA
_dBDX
_dNYP
049 _aNYPP
082 0 4 _a005.8
_223
_bCOL-N
090 _aTK5105.59
_b.C64 2014
091 _a005.8
100 1 _aCollins, Michael
245 1 0 _aNetwork security through data analysis :
_bbuilding situational awareness
_cMichael Collins.
260 _aMumbai:
_bShroff publication
_c©2014.
300 _axvii, 325 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references and index.
505 0 _aData: Sensors and detectors: an introduction -- Network sensors -- Host and service sensors: logging traffic at the source -- Data storage for analysis: relational databases, big data, and other options -- Tools: The SiLK suite -- An introduction to R for security analysts -- Classification and event tools: IDS, AV, and SEM -- Reference and lookup: tools for figuring out who someone is -- More tools -- Analytics: Exploratory data analysis and visualization -- On fumbling -- Volume and time analysis -- Graph analysis -- Application identification -- Network mapping.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aCommunication
_xNetwork analysis.
901 _aaew
_bCATBL
901 _aMARS
942 _2ddc
_cBK
_01
945 _a.b200536655
946 _am
999 _c10257
_d10257