Related Books
Language: en
Pages: 347
Pages: 347
Type: BOOK - Published: 2014-02-10 - Publisher: "O'Reilly Media, Inc."
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'l
Language: en
Pages: 427
Pages: 427
Type: BOOK - Published: 2017-09-08 - Publisher: "O'Reilly Media, Inc."
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical
Language: en
Pages: 497
Pages: 497
Type: BOOK - Published: 2013-11-26 - Publisher: Elsevier
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complet
Language: en
Pages: 274
Pages: 274
Type: BOOK - Published: 2007 - Publisher: No Starch Press
An introduction to a range of cyber security issues explains how to utilize graphical approaches to displaying and understanding computer security data, such as
Language: en
Pages: 353
Pages: 353
Type: BOOK - Published: 2017-09-18 - Publisher: CRC Press
Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB)