Atjaunināt sīkdatņu piekrišanu

E-grāmata: VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Mathematics and Visualization
  • Izdošanas datums: 27-May-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540782438
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Mathematics and Visualization
  • Izdošanas datums: 27-May-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540782438

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Visualization for computer security (VizSec) developers take advantage of the power of the human brain in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.

Visualization for computer security (VizSec) developers take advantage of the power of the human brain in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.

Recenzijas

From the reviews:









"This book is a collection of several very useful contributions. The introductory paper by the editors is quite useful as an overview of the field, and could very well be recommended reading for a course. I recommend this book to anyone who is involved in, or wants to get up to speed with the use of, visualization techniques in computer security." (Stefano Zanero, ACM Computing Reviews, October, 2008)

to Visualization for Computer Security.- The Real Work of Computer Network Defense Analysts.- Adapting Personas for Use in Security Visualization Design.- Measuring the Complexity of Computer Security Visualization Designs.- Integrated Environment Management for Information Operations Testbeds.- Visual Analysis of Network Flow Data with Timelines and Event Plots.- NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior.- Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today.- Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective.- High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping.- VisAlert: From Idea to Product.- Visually Understanding Jam Resistant Communication.- Visualization of Host Behavior for Network Security.- Putting Security in Context: Visual Correlation of Network Activity with Real-World Information.- An Interactive Attack Graph Cascade and Reachability Display.- Intelligent Classification and Visualization of Network Scans.- Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope.