Applied security visualization / (Record no. 745)

MARC details
000 -LEADER
fixed length control field 04798cam a2200421 i 4500
001 - CONTROL NUMBER
control field 15311918
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230531130122.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080602s2009 njuabf b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008023598
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 014681154
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0321510100
Qualifying information paperback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321510105
Qualifying information paperback
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn227921903
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)227921903
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency DLC
-- EG-CaTKH
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .M369 2009
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 MA.A 2009 G.C
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Marty, Raffael,
Dates associated with a name 1976-
Relator term author.
245 10 - TITLE STATEMENT
Title Applied security visualization /
Statement of responsibility, etc. Raffael Marty.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Upper Saddle River, NJ :
Name of producer, publisher, distributor, manufacturer Addison-Wesley,
Date of production, publication, distribution, manufacture, or copyright notice 2009.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 523 pages, 16 unnumbered pages of plates :
Other physical details illustrations (some color), maps (some color) ;
Dimensions 24 cm. +
Accompanying material 1 CD-ROM (4 3/4 in.)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Ch. 1. Visualization -- What Is Visualization? -- Why Visualization? -- Visualization Benefits -- Security Visualization -- Security Visualization's Dichotomy -- Visualization Theory -- Information Seeking Mantra -- Ch. 2. Data Sources -- Terminology -- Security Data -- Common Problems -- Packet Captures -- Traffic Flows -- Firewalls -- Intrusion Detection and Prevention Systems -- Passive Network Analysis -- Operating Systems -- Applications -- Configurations -- Ch. 3. Visually Representing Data -- Graph Properties -- $Simple Charts -- Stacked Charts -- Histograms -- Box Plots -- Scatter Plots -- Parallel Coordinates -- Link Graphs -- Maps -- Treemaps -- Three-Dimensional Views -- Interaction and Animation -- Choosing the Right Graph -- Challenges -- Ch. 4. From Data to Graphs -- Information Visualization Process -- Step 1: Define the Problem -- Step 2: Assess Available Data -- Step 3: Process Information -- Step 4: Visual Transformation -- Step 5: View Transformation -- Step 6: Interpret and Decide -- Tools for Data Processing -- Ch. 5. Visual Security Analysis -- Reporting -- Historical Analysis -- Real-Time Monitoring and Analysis -- Ch. 6. Perimeter Threat -- Traffic-Flow Monitoring and Analysis -- Firewall Log Analysis -- Intrusion Detection System Signature Tuning -- Wireless Sniffing -- Email Data Analysis -- Vulnerability Data Visualization -- Ch. 7. Compliance -- Policies, Objectives, and Controls -- Regulations and Industry Mandates -- IT Control Frameworks -- Logging Requirements -- Audit -- Business Process Monitoring -- Compliance Monitoring -- Risk Management -- Separation of Duties -- Database Monitoring -- Ch. 8. Insider Threat -- Insider Threat Visualization -- What Is a Malicious Insider? -- Three Types of Insider Crimes -- Who Are the Malicious Insiders? -- A Detection Framework for Malicious Insiders -- Improved Insider-Detection Process -- Challenges -- Proactive Mitigation -- Sample Precursors -- Ch. 9. Data Visualization Tools -- Data Inputs -- Freely Available Visualization Tools -- Open Source Visualization Libraries -- Libraries Summary -- Online Tools -- Commercial Visualization Tools.
520 ## - SUMMARY, ETC.
Summary, etc. "As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today's state-of-the-art data visualization techniques, you can gain a far deeper understanding of what's happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods." "In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You'll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance."--Jacket.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information visualization.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name yomna.nassar
Cataloging process P
First Date, FD (RLIN) 20230531
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20230531
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBA894671
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Gift collections The Knowledge Hub Library The Knowledge Hub Library 02/25/2021   005.8 MA.A 2009 G.C 191683 02/25/2021 02/25/2021 Books