Network Security Through Data Analysis: Building Situational Awareness (Paperback)
暫譯: 透過數據分析的網路安全:建立情境意識 (平裝本)
Michael Collins
買這商品的人也買了...
-
深入淺出設計模式 (Head First Design Patterns)$880$695 -
深入淺出 Java 程式設計, 2/e (Head First Java, 2/e)$880$695 -
SQL 語法範例辭典$550$434 -
數位影像處理, 5/e$450$427 -
大話設計模式$620$527 -
深入淺出 Python (Head First Python)$780$616 -
Android 4.X 手機/平板電腦程式設計入門、應用到精通, 2/e (適用 Android 1.X~4.X)$520$410 -
JavaScript 設計模式 (JavaScript Patterns)$480$379 -
笑談軟體工程:敏捷開發法的逆襲-導入 Scrum,讓你的軟體開發人生從黑白變彩色!$550$467 -
版本控制使用 Git, 2/e (Version Control with Git: Powerful tools and techniques for collaborative software development, 2/e)$580$458 -
Arduino UNO R3 開發板(副廠相容版)附傳輸線$400$392 -
Effective JavaScript 中文版 | 駕馭 JavaScript 的 68 個具體作法 (Effective JavaScript: 68 Specific Ways to Harness the Power of JavaScript)$450$355 -
挑戰大數據-Facebook、Google、Amazon 怎麼處理 Big Data?用 NoSQL 搞定每年 100 億顆硬碟資料$580$493 -
電腦網際網路, 6/e (國際版)(Computer Networking: A Top-Down Approach, 6/e)(附部分內容光碟)$650$585 -
精通 Objective-C 程式設計, 6/e (Programming in Objective-C, 6/e)$580$458 -
深入淺出 C#, 3/e (Head First C#, 3/e)$980$774 -
Unity 跨平台 3D 全方位遊戲設計(附基礎操作影音教學 / C# 與 JavaScript 雙語言範例檔)$500$395 -
超圖解 Arduino 互動設計入門, 2/e$680$537 -
Responsive Web Design 自動調適型網頁程式設計-讓網頁在電腦 / 平板 / 手機完美展現$360$284 -
ASP.NET MVC 5 網站開發美學$780$616 -
打下好基礎-程式設計與演算法競賽入門經典$500$395 -
iOS 8 程式設計實戰--205 個快速上手的開發技巧$500$395 -
HTML5: The Missing Manual, 2/e (國際中文版)$580$458 -
AngularJS 建置與執行 (AngularJS: Up and Running: Enhanced Productivity with Structured Web Apps)$520$411 -
設計模式與遊戲開發的完美結合$690$538
資訊安全書展|中文簡體2書75折 英文2書85折 詳見活動內容 »
-
VIP 95折
Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness (Paperback)$2,550$2,422 -
VIP 95折
Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility$1,900$1,805 -
85折
$1,785Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide: In-Depth Guidance and Practice -
VIP 95折
Data-Driven Cybersecurity: Reducing Risk with Proven Metrics$2,160$2,052 -
VIP 95折
Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision (Paperback)$1,690$1,605 -
85折
$1,573Microsoft Security Copilot: Master strategies for AI-driven cyber defense -
VIP 90折
Intelligent Continuous Security: Ai-Enabled Transformation for Seamless Protection (Paperback)$2,565$2,430 -
Privileged Access Management: Strategies for Zero Trust in the Enterprise$1,860$1,822 -
VIP 90折
Identity Security for Software Development: Best Practices That Every Developer Must Know (Paperback)$1,995$1,890 -
VIP 95折
Mastering Palo Alto Networks : The complete journey to firewall mastery from setup to advanced security, 3/e (Paperback)$1,850$1,757 -
VIP 95折
電腦安全:原理與實踐(原書第5版)*此書為英文原文書*$774$735 -
CISSP Study Guide 2025-2026: All in One CISSP Exam Prep for the ICS2 Certified Information Systems Security Professional Certification. With Exam Review Material & 774 CISSP Practice Test Questions (Paperback)$1,800$1,764 -
VIP 95折
IAPP CIPP / US Certified Information Privacy Professional Study Guide (Sybex Study Guide)$2,080$1,976 -
85折
$1,530Microsoft Cybersecurity Architect Exam Ref SC-100 - Second Edition: Ace the SC-100 exam and develop cutting-edge cybersecurity strategies -
Cryptography (Paperback)$850$833 -
VIP 95折
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption$2,100$1,995 -
VIP 95折
Open-Source Security Operations Center (Soc): A Complete Guide to Establishing, Managing, and Maintaining a Modern Soc (美國原版)$3,300$3,135 -
85折
$3,383A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice -
85折
$1,785Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles (Paperback) -
VIP 95折
Cryptography Algorithms - Second Edition: Get to grips with new algorithms in blockchain, zero-knowledge, homomorphic encryption, and quantum$1,840$1,748 -
VIP 90折
Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp$2,517$2,385 -
85折
$2,678Developing Cybersecurity Programs and Policies in an Ai-Driven World -
VIP 95折
Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection (Paperback)$1,990$1,890 -
VIP 95折
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (Hardcover) 2/e$2,800$2,660 -
85折
$1,530Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
相關主題
商品描述
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it.
Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting.
- Explore network, host, and service sensors for capturing security data
- Store data traffic with relational databases, graph databases, Redis, and Hadoop
- Use SiLK, the R language, and other tools for analysis and visualization
- Detect unusual phenomena through Exploratory Data Analysis (EDA)
- Identify significant structures in networks with graph analysis
- Determine the traffic that’s crossing service ports in a network
- Examine traffic volume and behavior to spot DDoS and database raids
- Get a step-by-step process for network mapping and inventory
商品描述(中文翻譯)
傳統的入侵偵測和日誌檔分析已經無法滿足當今複雜網路的保護需求。在這本實用指南中,安全研究員 Michael Collins 向您展示了幾種收集和分析網路流量數據集的技術和工具。您將了解您的網路如何被使用,以及需要採取哪些行動來保護和改善它。
本書分為三個部分,探討數據的收集和組織過程、各種分析工具,以及幾種不同的分析場景和技術。這本書非常適合熟悉腳本編寫的網路管理員和運營安全分析師。
- 探索用於捕獲安全數據的網路、主機和服務感測器
- 使用關聯式資料庫、圖形資料庫、Redis 和 Hadoop 儲存數據流量
- 使用 SiLK、R 語言和其他工具進行分析和可視化
- 通過探索性數據分析 (Exploratory Data Analysis, EDA) 偵測異常現象
- 使用圖形分析識別網路中的重要結構
- 確定網路中穿越服務埠的流量
- 檢查流量量和行為以發現 DDoS 和資料庫襲擊
- 獲得網路映射和清單的逐步流程
