EUR 34,95
  • Statt: EUR 35,95
  • Sie sparen: EUR 1,00 (3%)
  • Alle Preisangaben inkl. MwSt.
Nur noch 5 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Network Security Through ... ist in Ihrem Einkaufwagen hinzugefügt worden
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 2 Bilder anzeigen

Network Security Through Data Analysis: Building Situational Awareness (Englisch) Taschenbuch – 13. Februar 2014

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
"Bitte wiederholen"
EUR 34,95
EUR 30,26 EUR 17,88
53 neu ab EUR 30,26 9 gebraucht ab EUR 17,88

Wird oft zusammen gekauft

  • Network Security Through Data Analysis: Building Situational Awareness
  • +
  • The Practice of Network Security Monitoring
Gesamtpreis: EUR 65,90
Die ausgewählten Artikel zusammen kaufen

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre E-Mail-Adresse oder Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr


Über den Autor und weitere Mitwirkende

Michael Collins is the chief scientist for RedJack, LLC., a Network Security and Data Analysis company located in the Washington D.C. area. Prior to his work at RedJack, Dr. Collins was a member of the technical staff at the CERT/Network Situational Awareness group atCarnegie Mellon University. His primary focus is on network instrumentation and traffic analysis, in particular on the analysis of large traffic datasets. Dr. Collins graduated with a PhD in Electrical Engineering from Carnegie Mellon University in 2008, he holds Master's and Bachelor's Degrees from the same institution.


Es gibt noch keine Kundenrezensionen auf
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne

Die hilfreichsten Kundenrezensionen auf (beta) HASH(0x95658258) von 5 Sternen 8 Rezensionen
6 von 7 Kunden fanden die folgende Rezension hilfreich
HASH(0x9566d5ac) von 5 Sternen Network Security Through Data Analysis review 6. Juli 2014
Von Javier - Veröffentlicht auf
Format: Taschenbuch
One of the goals of this book is achieving situational awareness or, to put it another way, an understanding of the environment you are operating in. This book is about collecting data and looking at networks in order to understand how the network is used.

The author mentions the target for this book are network administrators and operational security analyts. I would add networking students and hackers on the top of this target. The content is very easy to follow though.

The book is divided into three sections (data, tools and analytics). It contains a total of 15 self-contained chapters.

The data section (chapters 1-4) covers the way to collect, storage and organize data. This part discuss about sensors, the best place to set them, the tooling to interface them and the issues/solutions related to the vast amount of data generated.

The tool section (chatpers 5-9) keeps the focus on tools. It covers analysis, visualization and reporting aspects. Some of these tools are SiLK, R, Graphviz, nmap, Wireshark or netcat.

The analytics section (chapters 10-15) studies the nature of the networking traffic and how some mathematical and statistical models can be used to examine data. Among the different analysis you can find useful information related to DDoS attacks, scanning patterns or port correlations approaches.

This book is interesting. It is a great update in this topic and it faces the recent issue of ‘big data’ and massive analysis from a network security perspective.

At the same time, I found the jargon of the author a bit thick along some chapters. I guess it is the result of trying to generalize some concepts and techniques while he introduces concrete examples.

As mentioned, I think this book contains good stuff. It covers a broad spectrum of topics so it could be a great book to jump in this area too. The author makes a good job and he talks from experience.
9 von 12 Kunden fanden die folgende Rezension hilfreich
HASH(0x95670b64) von 5 Sternen A guide to finding new threats in any secure operations center 7. März 2014
Von KEVIN M NOBLE - Veröffentlicht auf
Format: Kindle Edition Verifizierter Kauf
The book takes considerable time to explain traffic in general, sensing traffic and the logistics around making sense of network data both at the simplistic and the next level of analysis. Anyone who has a solid understanding or working in network monitoring can skip ahead to the more interesting analysis techniques at each layer of traffic, using fundamental principals and visualization to find potential threats.

The exploration of volume and time analysis was particularly interesting to me as I do similar work however, only goes far enough to give the reader or anyone willing to try the code presented in the book an idea of what is to be expected. Probably wise of the author not to go too deep and demonstrate a wide range of analysis missing in data centers and security operations.

I found the book to insightful and useful and good for anyone looking to make the leap to the higher echelons of detection.
4 von 5 Kunden fanden die folgende Rezension hilfreich
HASH(0x95549460) von 5 Sternen Informative at all career levels 17. Juni 2014
Von Jason A Rafail - Veröffentlicht auf
Format: Taschenbuch
To be upfront and open, I've known Michael for a number of years and worked with him at the CERT/CC. He is a brilliant analyst and has always been on the cutting edge of Network Analysis. His book is a nice blend of the basic principles and more advanced research techniques that few security analysts pursue. As people have said already, this is a comprehensive book that takes a look at Network Security from the basics into some of the often not thought about aspects. There are the basics of flow analysis and monitoring to start the reader off with a solid foundation, then the later chapters delve into true analysis. Most security professionals grasp the basics for interpretation of the flows to see trends and attacks, but few go further into the techniques for analysis of the packets to gain deeper intelligence into potential motives and attempts made against systems. This books takes the readers from their comfortable basics and introduces these thought processes and techniques in an understandable and easy to follow way. With examples and explanations to help develop this knowledge.

This isn't another user guide for existing monitor and alerting software, it is a tool for security analysts to use when actively trying to understand the overwhelming and generalized information they gather through such tools. With the examples and details provided, network engineers can dig deeper to better understand the source of threats and desired targets on their network. There's more to Network Security than just responding to software alerts and this book provides a good foothold into the more advanced analysis.
1 von 1 Kunden fanden die folgende Rezension hilfreich
HASH(0x95673d38) von 5 Sternen One of the best netsec books that I've read 5. August 2015
Von mjw - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
One of the best netsec books that I've read, and one of the few available that is directly applicable to monitoring high throughput enterprise networks. The author works through a complete stack of network monitoring tasks from network fundamentals, sensor placement, packet capture, software, data aggregation, storage, correlation, and analysis. The author shows an impressive breadth of knowledge while also expertly adding surprising depth when it's relevant and useful. Most of the tools and techniques are free/open-source and practical. Many enterprise netsec professionals will benefit from this book and will likely find a few tools/techniques they can readily use.
4 von 6 Kunden fanden die folgende Rezension hilfreich
HASH(0x955494b4) von 5 Sternen Great guide 2. Mai 2014
Von Timm McShane - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
Should be considered a gold standard for learning network security.
Breaks down the analysis problem effectively, clearly and simply. Starts from the beginning, allow new comers to get the full background needed to come up to speed rapidly.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.