000807875 000__ 02719cam\a2200469Ii\4500 000807875 001__ 807875 000807875 005__ 20210515141153.0 000807875 006__ m\\\\\o\\d\\\\\\\\ 000807875 007__ cr\un\nnnunnun 000807875 008__ 180215s2017\\\\caua\\\\ob\\\\001\0\eng\d 000807875 019__ $$a1003284697$$a1003492585$$a1003774629 000807875 020__ $$a9781491962817$$q(electronic book) 000807875 020__ $$a149196281X$$q(electronic book) 000807875 020__ $$a9781491962794 000807875 020__ $$a1491962798 000807875 020__ $$z9781491962848 000807875 020__ $$z1491962844 000807875 035__ $$a(OCoLC)on1004395162 000807875 035__ $$a(OCoLC)1004395162$$z(OCoLC)1003284697$$z(OCoLC)1003492585$$z(OCoLC)1003774629 000807875 035__ $$a807875 000807875 040__ $$aUMI$$beng$$erda$$epn$$cUMI$$dYDX$$dN$T$$dTEFOD$$dTOH$$dSTF$$dMERER$$dOCLCF$$dOCLCQ 000807875 049__ $$aISEA 000807875 050_4 $$aTK5105.59$$b.C64 2017eb 000807875 08204 $$a005.8$$223 000807875 1001_ $$aCollins, Michael$$q(Michael Patrick),$$eauthor. 000807875 24510 $$aNetwork security through data analysis :$$bfrom data to action /$$cMichael Collins. 000807875 250__ $$aSecond edition. 000807875 264_1 $$aSebastopol, CA :$$bO'Reilly Media,$$c2017. 000807875 300__ $$a1 online resource (1 volume) :$$billustrations 000807875 336__ $$atext$$btxt$$2rdacontent 000807875 337__ $$acomputer$$bc$$2rdamedia 000807875 338__ $$aonline resource$$bcr$$2rdacarrier 000807875 500__ $$aPrevious edition published: 2014. 000807875 504__ $$aIncludes bibliographical references and index. 000807875 5050_ $$aPart 1. Data. Organizing data : vantage, domain, action, and validity -- Vantage : understanding sensor placement in networks -- Sensors in the network domain -- Data in the service domain -- Sensors in the service domain -- Data and sensors in the host domain -- Data and sensors in the active domain -- Part 2. Tools. Getting data in one place -- The SiLK suite -- Reference and lookup : tools for figuring out who someone is -- Part 3. Analytics. Exploratory data analysis and visualization -- On analyzing text -- On fumbling -- On volume and time -- On graphs -- On insider threat -- On threat intelligence -- Application identification -- On network mapping -- On working with Ops.javascript:executeButton(2) 000807875 506__ $$aAccess limited to authorized users. 000807875 588__ $$aDescription based on online resource; title from title page (viewed September 18, 2017). 000807875 650_0 $$aComputer networks$$xSecurity measures. 000807875 650_0 $$aCommunication$$xNetwork analysis. 000807875 77608 $$iPrint version:$$aCollins, Michael (Michael Patrick)$$tNetwork security through data analysis.$$bSecond edition$$dSebastopol, CA : O'Reilly Media, 2017$$z1491962844$$z9781491962848$$w(OCoLC)966378503 000807875 852__ $$bacq 000807875 85280 $$bebk$$hEBSCOhost 000807875 85640 $$3eBooks on EBSCOhost$$uhttps://univsouthin.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1590702$$zOnline Access 000807875 909CO $$ooai:library.usi.edu:807875$$pGLOBAL_SET 000807875 980__ $$aBIB 000807875 983__ $$aOnline 000807875 994__ $$a92$$bISE