Network Security Through Data Analysis : From Data to Action by Michael Collins

US $45.00
大約HK$ 350.48
或講價
狀況:
全新
運送:
免費 USPS Priority Mail Padded Flat Rate Envelope®.
所在地:Johnston, Rhode Island, 美國
送達日期:
估計於 12月5日 (星期五)12月11日 (星期四)之間送達 運送地點 94104
估計運送時間是透過我們的獨家工具,根據買家與物品所在地的距離、所選的運送服務、賣家的運送紀錄及其他因素,計算大概的時間。送達時間會因時而異,尤其是節日。
退貨:
不可退貨.
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:385350588181
上次更新時間: 2023-01-27 09:22:51查看所有版本查看所有版本

物品細節

物品狀況
全新: 全新,未閱讀過和使用過的書籍,狀況完好,不存在缺頁或內頁受損。 查看所有物品狀況定義會在新視窗或分頁中開啟
Subject Area
Data Analysis
Subject
Networks
ISBN
9781491962848
類別

關於產品

Product Identifiers

Publisher
O'reilly Media, Incorporated
ISBN-10
1491962844
ISBN-13
9781491962848
eBay Product ID (ePID)
234355777

Product Key Features

Number of Pages
425 Pages
Publication Name
Network Security Through Data Analysis : from Data to Action
Language
English
Publication Year
2017
Subject
Security / General, Security / Networking
Type
Textbook
Subject Area
Computers
Author
Michael Collins
Format
Trade Paperback

Dimensions

Item Height
0.9 in
Item Weight
25.5 Oz
Item Length
9 in
Item Width
7.1 in

Additional Product Features

Edition Number
2
Intended Audience
Scholarly & Professional
LCCN
2018-304668
Illustrated
Yes
Synopsis
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques
LC Classification Number
TK5105.59

賣家提供的物品說明

賣家簡介

sourdoughstarter

100% 正面信用評價已賣出 17 件物品

加入日期:6月 2016

賣家信用評價 (6)

全部評級selected
正面
中立
負面
  • m***m (60)- 買家留下的信用評價。
    超過 1 年前
    購買已獲認證
    Fast shipping , item was as described
  • l***l (2418)- 買家留下的信用評價。
    超過 1 年前
    購買已獲認證
    Item as described. Quick Shipping. Thank you
  • 2***2 (5183)- 買家留下的信用評價。
    超過 1 年前
    購買已獲認證
    Great seller! Fast shipping, items as described. Thank you!