Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Security Visualization

Applied Security Visualization, 9780321510105 (0321510100), Addison Wesley, 2008


“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a straight forward way, and with hands-on examples, how such a challenge can be mastered. Let's get inspired.”

–Andreas Wuchner, Head of Global IT Security, Novartis


Use Visualization to Secure Your Network Against the Toughest, Best-Hidden Threats


As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today’s state-of-the-art data visualization techniques, you can gain a far deeper understanding of what’s happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods.


In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You’ll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance.


He concludes with an introduction to a broad set of visualization tools. The book’s CD also includes DAVIX, a compilation of freely available tools for security visualization.


You'll learn how to:

• Intimately understand the data sources that are essential for effective visualization

• Choose the most appropriate graphs and techniques for your IT data

• Transform complex data into crystal-clear visual representations

• Iterate your graphs to deliver even better insight for taking action

• Assess threats to your network perimeter, as well as threats imposed by insiders

• Use visualization to manage risks and compliance mandates more successfully

• Visually audit both the technical and organizational aspects of information and network security

• Compare and master today’s most useful tools for security visualization


Contains the live CD Data Analysis and Visualization Linux (DAVIX). DAVIX is a compilation of powerful tools for visualizing networks and assessing their security. DAVIX runs directly from the CD-ROM, without installation.


About the Author

Raffael Marty is Chief Security Strategist and Senior Product Manager for Splunk, the leading provider of large-scale, high-speed indexing and search technology for IT infrastructures. As customer advocate and guardian, he focuses on using his skills in data visualization, log management, intrusion detection, and compliance. An active participant on industry standards committees such as CEE (Common Event Expression) and OVAL (Open Vulnerability and Assessment Language),Marty created the Thor and AfterGlow automation tools and founded the security visualization portal secviz.org. Raffy’s passion for security visualization is evident in the many presentations he gives at conferences around the world. Prior to writing Applied Security Visualization, he contributed to a number of books on security and visualization. Before joining Splunk, Raffy managed the solutions team at ArcSight, served as IT security consultant for PriceWaterhouseCoopers, and was a member of the IBM Research Global Security Analysis Lab.

(HTML tags aren't allowed.)

Effective Computational Geometry for Curves and Surfaces (Mathematics and Visualization)
Effective Computational Geometry for Curves and Surfaces (Mathematics and Visualization)

This book covers combinatorial data structures and algorithms, algebraic issues in geometric computing, approximation of curves and surfaces, and computational topology. Each chapter fully details and provides a tutorial introduction to important concepts and results. The focus is on methods which are both well founded mathematically and...

Encyclopedia of Virtual Communities and Technologies
Encyclopedia of Virtual Communities and Technologies
Advances in computer and telecommunications technologies during the past several decades, have facilitated the creation of virtual communities and organizations throughout the world. As the growth in virtual communities accelerates, researchers are facing new challenges to learn about the latest of research and practices in this fast growing filed....
Oracle Data Integrator 11g Cookbook
Oracle Data Integrator 11g Cookbook

This book is all you need to take your understanding of Oracle Data Integrator to the next level. From initial deployment right through to esoteric techniques, the task-based approach will enhance your expertise effortlessly.


  • Clear, step-by-step recipes to walk you through some of the most...

Mastering Autodesk Inventor and Autodesk Inventor LT 2011
Mastering Autodesk Inventor and Autodesk Inventor LT 2011

Autodesk Inventor was introduced in 1999 as an ambitious 3D parametric modeler based not on the familiar AutoCAD programming architecture but instead on a separate foundation that would provide the room needed to grow into the fully featured modeler it is now, a decade later. Inventor 2011 continues the development of Inventor with...

Coaching Into Greatness: 4 Steps to Success in Business and Life
Coaching Into Greatness: 4 Steps to Success in Business and Life

Internationally acclaimed business coach and consultant Kim George provides an easy-to-master process for coaches to bring out innate greatness and achieve peak performance. George introduces a new kind of intelligence quotient, Abundance Intelligence. AQ is the key to living into greatness, moving from a mentality of scarcity to one of...

Beginning TiVo Programming (Wrox Beginning Guides)
Beginning TiVo Programming (Wrox Beginning Guides)
Now you can extend the world's most popular DVR by utilizing the TiVo Home Media Engine SDK. With the Java-based HME you can build new and exciting applications for broadband-connected Series 2 devices, and inside you will find numerous real-world examples that will help you deploy your own applications to TiVo quickly and easily.


©2019 LearnIT (support@pdfchm.net) - Privacy Policy