000 | 01635cam a2200349Ia 4500 | ||
---|---|---|---|
001 | 862760366 | ||
003 | OCoLC | ||
005 | 20220329020002.0 | ||
008 | 130918s2014 cc a 001 0 eng d | ||
015 |
_aGBB3A1749 _2bnb |
||
016 | 7 |
_a016537440 _2Uk |
|
020 | _a9789351105244 | ||
035 |
_a(OCoLC)862760366 _z(OCoLC)830813801 _z(OCoLC)832259934 |
||
040 |
_aUKMGB _beng _cUKMGB _dOCLCO _dYBM _dYDXCP _dBTCTA _dBDX _dNYP |
||
049 | _aNYPP | ||
082 | 0 | 4 |
_a005.8 _223 _bCOL-N |
090 |
_aTK5105.59 _b.C64 2014 |
||
091 | _a005.8 | ||
100 | 1 | _aCollins, Michael | |
245 | 1 | 0 |
_aNetwork security through data analysis : _bbuilding situational awareness _cMichael Collins. |
260 |
_aMumbai: _bShroff publication _c©2014. |
||
300 |
_axvii, 325 p. : _bill. ; _c24 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aData: Sensors and detectors: an introduction -- Network sensors -- Host and service sensors: logging traffic at the source -- Data storage for analysis: relational databases, big data, and other options -- Tools: The SiLK suite -- An introduction to R for security analysts -- Classification and event tools: IDS, AV, and SEM -- Reference and lookup: tools for figuring out who someone is -- More tools -- Analytics: Exploratory data analysis and visualization -- On fumbling -- Volume and time analysis -- Graph analysis -- Application identification -- Network mapping. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aCommunication _xNetwork analysis. |
|
901 |
_aaew _bCATBL |
||
901 | _aMARS | ||
942 |
_2ddc _cBK _01 |
||
945 | _a.b200536655 | ||
946 | _am | ||
999 |
_c10257 _d10257 |