This title has not yet been published (see below for estimated publication date). If you choose to preorder, your credit card will not be charged until then. You'll receive an email confirmation when we ship your order. You may cancel your order anytime by emailing firstname.lastname@example.org
System and network administrators have traditionally monitored their systems through general tools such as intrusion detection and logfile analysis. But modern, complex networks, suffering from more and more sophisticated attacks, deserve more analytical tools. Michael Collins, a leading researcher in security, introduces the techniques needed in this book and highlights some of the computing tools that will help catch problems.
The book is divided into three large sections: data collection, analysis, and taking action. These can be iterative, as each discovery alerts the administrator to data that should be collected. Several forms of analysis and visualization are covered. Topics include:
- What data to capture on your systems
- Data fusion
- Structures and storage systems for data
- Using R, SiLK, and Python for analysis
- Visualization and exploratory data analysis
- Graph analysis
- Network mapping
- Address forensics: determining where traffic originates
- Handling malware
Unless otherwise noted above, most orders ship within 1 to 2 days. We will promptly notify you if there is a stock problem with any items on your order and provide you with an estimated delivery date. If you have a firm need by date, please provide such information in the comment section at checkout.
Publisher: O'Reilly Media
Page Count (est.): 302
Pub Date: 2/15/2014