Paperback: 552 pages
Publisher: Addison-Wesley Professional; 1 book (August 11, 2008)
Language: English
ISBN-10: 0321510100
ISBN-13: 978-0321510105
“Collecting record interpretation is a single thing, carrying applicable report is something else. The art to renovate all kinds of record interpretation in to suggestive confidence report is a core of this book. Raffy illustrates in a true brazen way, as good as with hands-on examples, how such a plea can be mastered. Let’s get inspired.”
–Andreas Wuchner, Head of Global IT Security, Novartis
Use Visualization to Secure Your Network Against a Toughest, Best-Hidden Threats
As networks turn ever some-more complex, securing them becomes some-more as good as some-more difficult. The resolution is visualization. Using today’s state-of-the-art interpretation cognisance techniques, we can benefit a distant deeper bargain of what’s function upon your network right now. You can expose dark patterns of data, brand rising vulnerabilities as good as attacks, as good as reply decisively with countermeasures which have been distant some-more expected to attain than required methods.
In Applied Security Visualization, heading network confidence cognisance expert Raffael Marty introduces all a concepts, techniques, as good as collection we need to make make use of of cognisance upon your network. You’ll sense how to brand as good as implement a right interpretation sources, afterwards renovate your interpretation in to visuals which exhibit what we unequivocally need to know. Next, Marty shows how to make make use of of cognisance to perform extended network confidence analyses, consider specific threats, as good as even urge commercial operation compliance.
He concludes with an key to a extended set of cognisance tools. The book’s CD additionally includes DAVIX, a gathering of openly accessible collection for confidence visualization.
You’ll sense how to:
• Intimately assimilate a interpretation sources which have been necessary for in effect visualization
• Choose a many suitable graphs as good as techniques for your IT data
• Transform formidable interpretation in to intelligible visible representations
• Iterate your graphs to broach even improved discernment for receiving action
• Assess threats to your network perimeter, as good as threats imposed by insiders
• Use cognisance to conduct risks as good as correspondence mandates some-more successfully
• Visually review both a technical as good as organizational aspects of report as good as network security
• Compare as good as master today’s many utilitarian collection for confidence visualization
Contains a live CD Data Analysis as good as Visualization Linux (DAVIX). DAVIX is a gathering of absolute collection for visualizing networks as good as assessing their security. DAVIX runs but delay from a CD-ROM, but installation.
Table of Contents
Preface xiii
Chapter 1 Visualization 1
Chapter 2 Data Sources 21
Chapter 3 VisuallyRepresenting Data 65
Chapter 4 From Data to Graphs 119
Chapter 5 Visual Security Analysis 161
Chapter 6 Perimeter Threat 239
Chapter 7 Compliance 315
Chapter 8 Insider Threat 373
Chapter 9 Data Visualization Tools 445
Index 507
About a Author
Raffael Marty is arch confidence strategist as good as comparison product physical education instructor for Splunk, a heading provider of large-scale, high-speed indexing as good as poke record for IT infrastructures. As patron disciple as good as guardian, he focuses upon regulating his skills in interpretation visualization, record management, penetration detection, as good as compliance. An active part of upon attention standards committees such as CEE (Common Event Expression) as good as OVAL (Open Vulnerability as good as Assessment Language), Marty combined a Thor as good as AfterGlow industrialisation tools, as good as founded a confidence cognisance portal secviz.org. Before fasten Splunk, he managed a solutions group during ArcSight, served as IT confidence expert for PriceWaterhouseCoopers, as good as was a part of of a IBM Research Global Security Analysis Lab.
Download ebook from rapidshare
No comments:
Post a Comment