Data analysis for network cyber-security
Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is rela...
Saved in:
| Other Authors: | Adams, Niall M. (Editor), Heard, Nicholas (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
London, UK
Imperial College Press
2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Network security through data analysis from data to action
by: Collins, Michael (Michael Patrick)
Published: (2017)
by: Collins, Michael (Michael Patrick)
Published: (2017)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Data science for cyber-security
Published: (2019)
Published: (2019)
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Network security in the 90's issues and solutions for managers
by: Madron, Thomas William 1937-
Published: (1992)
by: Madron, Thomas William 1937-
Published: (1992)
Network security and management
by: Singh, Brijendra
Published: (2012)
by: Singh, Brijendra
Published: (2012)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security, firewalls, and VPNs
by: Stewart, James Michael
Published: (2014)
by: Stewart, James Michael
Published: (2014)
Inside network perimeter security the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
by: Northcutt, Stephen, et al.
Published: (2005)
by: Northcutt, Stephen, et al.
Published: (2005)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Building secure and reliable networks applications
by: Birman
Published: (1996)
by: Birman
Published: (1996)
Security + guide to network security fundamentals
by: Campbell
Published: (2003)
by: Campbell
Published: (2003)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Zero trust networks building secure systems in untrusted networks
by: Gilman, Evan, et al.
Published: (2017)
by: Gilman, Evan, et al.
Published: (2017)
Network security, firewalls, and VPNs
by: Stewart, James Michael, et al.
Published: (2021)
by: Stewart, James Michael, et al.
Published: (2021)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Network vulnerability assessment identify security loopholes in your network's infrastructure
by: Rahalkar, Sagar
Published: (2018)
by: Rahalkar, Sagar
Published: (2018)
Applied network security monitoring collection, detection and analysis
by: Sanders, Chris
Published: (2014)
by: Sanders, Chris
Published: (2014)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Network and application security fundamentals and practices
by: Ganguly, Debashis
Published: (2012)
by: Ganguly, Debashis
Published: (2012)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Security+ guide to network security fundamentals
by: Ciampa, Mark D.
Published: (2012)
by: Ciampa, Mark D.
Published: (2012)
Network defense and countermeasures principles and practices
by: Easttom, Chuck
Published: (2018)
by: Easttom, Chuck
Published: (2018)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Security and privacy issues in sensor networks and IoT
Published: (2020)
Published: (2020)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Similar Items
-
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016) -
Network security through data analysis from data to action
by: Collins, Michael (Michael Patrick)
Published: (2017) -
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019) -
Data science for cyber-security
Published: (2019) -
Network security how to plan for it and achieve it
by: Baker
Published: (1995)


