PortadaGruposCharlasMásPanorama actual
Buscar en el sitio
Este sitio utiliza cookies para ofrecer nuestros servicios, mejorar el rendimiento, análisis y (si no estás registrado) publicidad. Al usar LibraryThing reconoces que has leído y comprendido nuestros términos de servicio y política de privacidad. El uso del sitio y de los servicios está sujeto a estas políticas y términos.

Resultados de Google Books

Pulse en una miniatura para ir a Google Books.

Cargando...

Applied Security Visualization

por Raffael Marty

MiembrosReseñasPopularidadValoración promediaConversaciones
49Ninguno525,879 (4.5)Ninguno
APPLIED SECURITY VISUALIZATION   "Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a straight forward way, and with hands-on examples, how such a challenge can be mastered. Let''s get inspired." -Andreas Wuchner, Head of Global IT Security, Novartis   Use Visualization to Secure Your Network Against the Toughest, Best-Hidden Threats   As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today''s state-of-the-art data visualization techniques, you can gain a far deeper understanding of what''s happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods.   In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You''ll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance.   He concludes with an introduction to a broad set of visualization tools. The book''s CD also includes DAVIX, a compilation of freely available tools for security visualization.   You''ll learn how to: * Intimately understand the data sources that are essential for effective visualization * Choose the most appropriate graphs and techniques for your IT data * Transform complex data into crystal-clear visual representations * Iterate your graphs to deliver even better insight for taking action * Assess threats to your network perimeter, as well as threats imposed by insiders * Use visualization to manage risks and compliance mandates more successfully * Visually audit both the technical and organizational aspects of information and network security * Compare and master today''s most useful tools for security visualization   Contains the live CD Data Analysis and Visualization Linux (DAVIX). DAVIX is a compilation of powerful tools for visualizing networks and assessing their security. DAVIX runs directly from the CD-ROM, without installation.   Raffael Marty is chief security strategist and senior product manager for Splunk, the leading provider of large-scale, high-speed indexing and search technology for IT infrastructures. As customer advocate and guardian, he focuses on using his skills in data visualization, log management, intrusion detection, and compliance. An active participant on industry standards committees such as CEE (Common Event Expression) and OVAL (Open Vulnerability and Assessment Language), Marty created the Thor and AfterGlow automation tools, and founded the security visualization portal secviz.org. Before joining Splunk, he managed the solutions team at ArcSight, served as IT security consultant for PriceWaterhouseCoopers, and was a member of the IBM Research Global Security Analysis Lab.  … (más)
Añadido recientemente porzhuazhua88, phvisser, aapplegate, jbsavitz1, jzaientz, kallix
Ninguno
Cargando...

Inscríbete en LibraryThing para averiguar si este libro te gustará.

Actualmente no hay Conversaciones sobre este libro.

Ninguna reseña
sin reseñas | añadir una reseña
Debes iniciar sesión para editar los datos de Conocimiento Común.
Para más ayuda, consulta la página de ayuda de Conocimiento Común.
Título canónico
Título original
Títulos alternativos
Fecha de publicación original
Personas/Personajes
Lugares importantes
Acontecimientos importantes
Películas relacionadas
Epígrafe
Dedicatoria
Primeras palabras
Citas
Últimas palabras
Aviso de desambiguación
Editores de la editorial
Blurbistas
Idioma original
DDC/MDS Canónico
LCC canónico

Referencias a esta obra en fuentes externas.

Wikipedia en inglés (2)

APPLIED SECURITY VISUALIZATION   "Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a straight forward way, and with hands-on examples, how such a challenge can be mastered. Let''s get inspired." -Andreas Wuchner, Head of Global IT Security, Novartis   Use Visualization to Secure Your Network Against the Toughest, Best-Hidden Threats   As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today''s state-of-the-art data visualization techniques, you can gain a far deeper understanding of what''s happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods.   In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You''ll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance.   He concludes with an introduction to a broad set of visualization tools. The book''s CD also includes DAVIX, a compilation of freely available tools for security visualization.   You''ll learn how to: * Intimately understand the data sources that are essential for effective visualization * Choose the most appropriate graphs and techniques for your IT data * Transform complex data into crystal-clear visual representations * Iterate your graphs to deliver even better insight for taking action * Assess threats to your network perimeter, as well as threats imposed by insiders * Use visualization to manage risks and compliance mandates more successfully * Visually audit both the technical and organizational aspects of information and network security * Compare and master today''s most useful tools for security visualization   Contains the live CD Data Analysis and Visualization Linux (DAVIX). DAVIX is a compilation of powerful tools for visualizing networks and assessing their security. DAVIX runs directly from the CD-ROM, without installation.   Raffael Marty is chief security strategist and senior product manager for Splunk, the leading provider of large-scale, high-speed indexing and search technology for IT infrastructures. As customer advocate and guardian, he focuses on using his skills in data visualization, log management, intrusion detection, and compliance. An active participant on industry standards committees such as CEE (Common Event Expression) and OVAL (Open Vulnerability and Assessment Language), Marty created the Thor and AfterGlow automation tools, and founded the security visualization portal secviz.org. Before joining Splunk, he managed the solutions team at ArcSight, served as IT security consultant for PriceWaterhouseCoopers, and was a member of the IBM Research Global Security Analysis Lab.  

No se han encontrado descripciones de biblioteca.

Descripción del libro
Resumen Haiku

Debates activos

Ninguno

Cubiertas populares

Enlaces rápidos

Valoración

Promedio: (4.5)
0.5
1
1.5
2
2.5
3
3.5
4 1
4.5
5 1

¿Eres tú?

Conviértete en un Autor de LibraryThing.

 

Acerca de | Contactar | LibraryThing.com | Privacidad/Condiciones | Ayuda/Preguntas frecuentes | Blog | Tienda | APIs | TinyCat | Bibliotecas heredadas | Primeros reseñadores | Conocimiento común | 206,477,309 libros! | Barra superior: Siempre visible