Applied Security Visualization [With CDROM]
Autor Raffael Martyen Limba Engleză Mixed media product – 31 iul 2008
Preț: 313.26 lei
Preț vechi: 391.58 lei
-20% Nou
Puncte Express: 470
Preț estimativ în valută:
59.95€ • 63.25$ • 49.96£
59.95€ • 63.25$ • 49.96£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780321510105
ISBN-10: 0321510100
Pagini: 523
Ilustrații: illustrations
Dimensiuni: 173 x 229 x 28 mm
Greutate: 0.86 kg
Ediția:1
Editura: Addison-Wesley Professional
Locul publicării:Boston, United States
ISBN-10: 0321510100
Pagini: 523
Ilustrații: illustrations
Dimensiuni: 173 x 229 x 28 mm
Greutate: 0.86 kg
Ediția:1
Editura: Addison-Wesley Professional
Locul publicării:Boston, United States
Descriere
APPLIED SECURITY VISUALIZATION
“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a straight forward way, and with hands-on examples, how such a challenge can be mastered. Let's get inspired.”
–Andreas Wuchner, Head of Global IT Security, Novartis
Use Visualization to Secure Your Network Against the Toughest, Best-Hidden Threats
As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today’s state-of-the-art data visualization techniques, you can gain a far deeper understanding of what’s happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods.
In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You’ll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance.
He concludes with an introduction to a broad set of visualization tools. The book’s CD also includes DAVIX, a compilation of freely available tools for security visualization.
You'll learn how to:
• Intimately understand the data sources that are essential for effective visualization
• Choose the most appropriate graphs and techniques for your IT data
• Transform complex data into crystal-clear visual representations
• Iterate your graphs to deliver even better insight for taking action
• Assess threats to your network perimeter, as well as threats imposed by insiders
• Use visualization to manage risks and compliance mandates more successfully
• Visually audit both the technical and organizational aspects of information and network security
• Compare and master today’s most useful tools for security visualization
Contains the live CD Data Analysis and Visualization Linux (DAVIX). DAVIX is a compilation of powerful tools for visualizing networks and assessing their security. DAVIX runs directly from the CD-ROM, without installation.
Raffael Marty is chief security strategist and senior product manager for Splunk, the leading provider of large-scale, high-speed indexing and search technology for IT infrastructures. As customer advocate and guardian, he focuses on using his skills in data visualization, log management, intrusion detection, and compliance. An active participant on industry standards committees such as CEE (Common Event Expression) and OVAL (Open Vulnerability and Assessment Language), Marty created the Thor and AfterGlow automation tools, and founded the security visualization portal secviz.org. Before joining Splunk, he managed the solutions team at ArcSight, served as IT security consultant for PriceWaterhouseCoopers, and was a member of the IBM Research Global Security Analysis Lab.
“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a straight forward way, and with hands-on examples, how such a challenge can be mastered. Let's get inspired.”
–Andreas Wuchner, Head of Global IT Security, Novartis
Use Visualization to Secure Your Network Against the Toughest, Best-Hidden Threats
As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today’s state-of-the-art data visualization techniques, you can gain a far deeper understanding of what’s happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods.
In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You’ll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance.
He concludes with an introduction to a broad set of visualization tools. The book’s CD also includes DAVIX, a compilation of freely available tools for security visualization.
You'll learn how to:
• Intimately understand the data sources that are essential for effective visualization
• Choose the most appropriate graphs and techniques for your IT data
• Transform complex data into crystal-clear visual representations
• Iterate your graphs to deliver even better insight for taking action
• Assess threats to your network perimeter, as well as threats imposed by insiders
• Use visualization to manage risks and compliance mandates more successfully
• Visually audit both the technical and organizational aspects of information and network security
• Compare and master today’s most useful tools for security visualization
Contains the live CD Data Analysis and Visualization Linux (DAVIX). DAVIX is a compilation of powerful tools for visualizing networks and assessing their security. DAVIX runs directly from the CD-ROM, without installation.
Raffael Marty is chief security strategist and senior product manager for Splunk, the leading provider of large-scale, high-speed indexing and search technology for IT infrastructures. As customer advocate and guardian, he focuses on using his skills in data visualization, log management, intrusion detection, and compliance. An active participant on industry standards committees such as CEE (Common Event Expression) and OVAL (Open Vulnerability and Assessment Language), Marty created the Thor and AfterGlow automation tools, and founded the security visualization portal secviz.org. Before joining Splunk, he managed the solutions team at ArcSight, served as IT security consultant for PriceWaterhouseCoopers, and was a member of the IBM Research Global Security Analysis Lab.
Cuprins
Raffael Marty, Applied Security Visualization (0321510100)
Preface xiii
Chapter 1 Visualization 1
Chapter 2 Data Sources 21
Chapter 3 VisuallyRepresenting Data 65
Chapter 4 From Data to Graphs 119
Chapter 5 Visual Security Analysis 161
Chapter 6 Perimeter Threat 239
Chapter 7 Compliance 315
Chapter 8 Insider Threat 373
Chapter 9 Data Visualization Tools 445
Index 507
Preface xiii
Chapter 1 Visualization 1
Chapter 2 Data Sources 21
Chapter 3 VisuallyRepresenting Data 65
Chapter 4 From Data to Graphs 119
Chapter 5 Visual Security Analysis 161
Chapter 6 Perimeter Threat 239
Chapter 7 Compliance 315
Chapter 8 Insider Threat 373
Chapter 9 Data Visualization Tools 445
Index 507
Notă biografică
Raffael Marty is Chief Security Strategist and Senior Product Manager for Splunk, the leading provider of large-scale, high-speed indexing and search technology for IT infrastructures. As customer advocate and guardian, he focuses on using his skills in data visualization, log management, intrusion detection, and compliance. An active participant on industry standards committees such as CEE (Common Event Expression) and OVAL (Open Vulnerability and Assessment Language),Marty created the Thor and AfterGlow automation tools and founded the security visualization portal secviz.org. Raffy’s passion for security visualization is evident in the many presentations he gives at conferences around the world. Prior to writing Applied Security Visualization, he contributed to a number of books on security and visualization. Before joining Splunk, Raffy managed the solutions team at ArcSight, served as IT security consultant for PriceWaterhouseCoopers, and was a member of the IBM Research Global Security Analysis Lab.
Textul de pe ultima copertă
APPLIED SECURITY VISUALIZATION ""Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a straight forward way, and with hands-on examples, how such a challenge can be mastered. Let's get inspired."" -Andreas Wuchner, Head of Global IT Security, Novartis Use Visualization to Secure Your Network Against the Toughest, Best-Hidden Threats As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today's state-of-the-art data visualization techniques, you can gain a far deeper understanding of what's happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods. In "Applied Security Visualization," leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You'll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance. He concludes with an introduction to a broad set of visualization tools. The book's CD also includes DAVIX, a compilation of freely available tools for security visualization. You'll learn how to: - Intimately understand the data sources that are essential for effective visualization - Choose the most appropriate graphs and techniques for your IT data - Transform complex data into crystal-clear visual representations - Iterate your graphs to deliver even better insight for taking action - Assess threats to your network perimeter, as well as threats imposed by insiders - Use visualization to manage risks and compliance mandates more successfully - Visually audit both the technical and organizational aspects of information and network security - Compare and master today's most useful tools for security visualization Contains the live CD Data Analysis and Visualization Linux (DAVIX). DAVIX is a compilation of powerful tools for visualizing networks and assessing their security. DAVIX runs directly from the CD-ROM, without installation. Raffael Marty is chief security strategist and senior product manager for Splunk, the leading provider of large-scale, high-speed indexing and search technology for IT infrastructures. As customer advocate and guardian, he focuses on using his skills in data visualization, log management, intrusion detection, and compliance. An active participant on industry standards committees such as CEE (Common Event Expression) and OVAL (Open Vulnerability and Assessment Language), Marty created the Thor and AfterGlow automation tools, and founded the security visualization portal secviz.org. Before joining Splunk, he managed the solutions team at ArcSight, served as IT security consultant for PriceWaterhouseCoopers, and was a member of the IBM Research Global Security Analysis Lab.