Table of Contents for
Network Security Through Data Analysis, 2nd Edition
Close
Version ebook
/
Retour
Network Security Through Data Analysis, 2nd Edition
by Michael Collins
Published by O'Reilly Media, Inc., 2017
Cover
nav
Praise for Network Security Through Data Analysis, Second Edition
Network Security Through Data Analysis
Network Security Through Data Analysis
Preface
I. Data
1. Organizing Data: Vantage, Domain, Action, and Validity
2. Vantage: Understanding Sensor Placement in Networks
3. Sensors in the Network Domain
4. Data in the Service Domain
5. Sensors in the Service Domain
6. Data and Sensors in the Host Domain
7. Data and Sensors in the Active Domain
II. Tools
8. Getting Data in One Place
9. The SiLK Suite
10. Reference and Lookup: Tools for Figuring Out Who Someone Is
III. Analytics
11. Exploratory Data Analysis and Visualization
12. On Analyzing Text
13. On Fumbling
14. On Volume and Time
15. On Graphs
16. On Insider Threat
17. On Threat Intelligence
18. Application Identification
19. On Network Mapping
20. On Working with Ops
21. Conclusions
Index
About the Author
Colophon
Next
Next Chapter
Praise for Network Security Through Data Analysis, Second Edition
Next
Next Chapter
Praise for Network Security Through Data Analysis, Second Edition