MARC details
000 -LEADER |
fixed length control field |
04798cam a2200421 i 4500 |
001 - CONTROL NUMBER |
control field |
15311918 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230531130122.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
080602s2009 njuabf b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2008023598 |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
014681154 |
Source |
Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0321510100 |
Qualifying information |
paperback |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780321510105 |
Qualifying information |
paperback |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn227921903 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)227921903 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
DLC |
-- |
EG-CaTKH |
Description conventions |
rda |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.M369 2009 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 MA.A 2009 G.C |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Marty, Raffael, |
Dates associated with a name |
1976- |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Applied security visualization / |
Statement of responsibility, etc. |
Raffael Marty. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Upper Saddle River, NJ : |
Name of producer, publisher, distributor, manufacturer |
Addison-Wesley, |
Date of production, publication, distribution, manufacture, or copyright notice |
2009. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiii, 523 pages, 16 unnumbered pages of plates : |
Other physical details |
illustrations (some color), maps (some color) ; |
Dimensions |
24 cm. + |
Accompanying material |
1 CD-ROM (4 3/4 in.) |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Ch. 1. Visualization -- What Is Visualization? -- Why Visualization? -- Visualization Benefits -- Security Visualization -- Security Visualization's Dichotomy -- Visualization Theory -- Information Seeking Mantra -- Ch. 2. Data Sources -- Terminology -- Security Data -- Common Problems -- Packet Captures -- Traffic Flows -- Firewalls -- Intrusion Detection and Prevention Systems -- Passive Network Analysis -- Operating Systems -- Applications -- Configurations -- Ch. 3. Visually Representing Data -- Graph Properties -- $Simple Charts -- Stacked Charts -- Histograms -- Box Plots -- Scatter Plots -- Parallel Coordinates -- Link Graphs -- Maps -- Treemaps -- Three-Dimensional Views -- Interaction and Animation -- Choosing the Right Graph -- Challenges -- Ch. 4. From Data to Graphs -- Information Visualization Process -- Step 1: Define the Problem -- Step 2: Assess Available Data -- Step 3: Process Information -- Step 4: Visual Transformation -- Step 5: View Transformation -- Step 6: Interpret and Decide -- Tools for Data Processing -- Ch. 5. Visual Security Analysis -- Reporting -- Historical Analysis -- Real-Time Monitoring and Analysis -- Ch. 6. Perimeter Threat -- Traffic-Flow Monitoring and Analysis -- Firewall Log Analysis -- Intrusion Detection System Signature Tuning -- Wireless Sniffing -- Email Data Analysis -- Vulnerability Data Visualization -- Ch. 7. Compliance -- Policies, Objectives, and Controls -- Regulations and Industry Mandates -- IT Control Frameworks -- Logging Requirements -- Audit -- Business Process Monitoring -- Compliance Monitoring -- Risk Management -- Separation of Duties -- Database Monitoring -- Ch. 8. Insider Threat -- Insider Threat Visualization -- What Is a Malicious Insider? -- Three Types of Insider Crimes -- Who Are the Malicious Insiders? -- A Detection Framework for Malicious Insiders -- Improved Insider-Detection Process -- Challenges -- Proactive Mitigation -- Sample Precursors -- Ch. 9. Data Visualization Tools -- Data Inputs -- Freely Available Visualization Tools -- Open Source Visualization Libraries -- Libraries Summary -- Online Tools -- Commercial Visualization Tools. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today's state-of-the-art data visualization techniques, you can gain a far deeper understanding of what's happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods." "In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You'll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance."--Jacket. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information visualization. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
yomna.nassar |
Cataloging process |
P |
First Date, FD (RLIN) |
20230531 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20230531 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBA894671 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |