Network security through data analysis from data to action
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network...
Saved in:
| Main Author: | Collins, Michael (Michael Patrick) (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Sebastopol, CA
O'Reilly Media, Inc.
2017
|
| Edition: | Second edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Network security, firewalls, and VPNs
by: Stewart, James Michael
Published: (2014)
by: Stewart, James Michael
Published: (2014)
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Network security in the 90's issues and solutions for managers
by: Madron, Thomas William 1937-
Published: (1992)
by: Madron, Thomas William 1937-
Published: (1992)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Building secure and reliable networks applications
by: Birman
Published: (1996)
by: Birman
Published: (1996)
Network security, firewalls, and VPNs
by: Stewart, James Michael, et al.
Published: (2021)
by: Stewart, James Michael, et al.
Published: (2021)
Network security and management
by: Singh, Brijendra
Published: (2012)
by: Singh, Brijendra
Published: (2012)
Inside network perimeter security the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
by: Northcutt, Stephen, et al.
Published: (2005)
by: Northcutt, Stephen, et al.
Published: (2005)
Zero trust networks building secure systems in untrusted networks
by: Gilman, Evan, et al.
Published: (2017)
by: Gilman, Evan, et al.
Published: (2017)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Network vulnerability assessment identify security loopholes in your network's infrastructure
by: Rahalkar, Sagar
Published: (2018)
by: Rahalkar, Sagar
Published: (2018)
Network analysis and design
by: Robiah Yusof
Published: (2006)
by: Robiah Yusof
Published: (2006)
Security + guide to network security fundamentals
by: Campbell
Published: (2003)
by: Campbell
Published: (2003)
Network defense and countermeasures principles and practices
by: Easttom, Chuck
Published: (2018)
by: Easttom, Chuck
Published: (2018)
Data and network communications
by: Miller, Michael A.
Published: (2000)
by: Miller, Michael A.
Published: (2000)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide /
by: Chapple, Mike, et al.
Published: (2024)
by: Chapple, Mike, et al.
Published: (2024)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Applied network security monitoring collection, detection and analysis
by: Sanders, Chris
Published: (2014)
by: Sanders, Chris
Published: (2014)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Security+ guide to network security fundamentals
by: Ciampa, Mark D.
Published: (2012)
by: Ciampa, Mark D.
Published: (2012)
Network and application security fundamentals and practices
by: Ganguly, Debashis
Published: (2012)
by: Ganguly, Debashis
Published: (2012)
Similar Items
-
Data analysis for network cyber-security
Published: (2014) -
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017) -
Network security, firewalls, and VPNs
by: Stewart, James Michael
Published: (2014) -
Network security how to plan for it and achieve it
by: Baker
Published: (1995) -
Network security architectures
by: Convery, Sean
Published: (2012)


