Wonder Club world wonders pyramid logo
×

Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security Book

Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security
Be the First to Review this Item at Wonderclub
X
Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security, Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicat, Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security
out of 5 stars based on 0 reviews
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security
  • Written by author Goodall, John R., Conti, Gregory, Ma, Kwan-Liu
  • Published by Springer-Verlag New York, LLC, 12/15/2010
  • Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicat
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Introduction to visualization for computer security J. R. Goodall Goodall, J. R. 1

The real work of computer network defense analysts A. D'Amico D'Amico, A. K. Whitley Whitley, K. 19

Adapting personas for use in security visualization design J. Stoll Stoll, J. D. McColgin McColgin, D. M. Gregory Gregory, M. V. Crow Crow, V. W. K. Edwards Edwards, W. K. 39

Measuring the complexity of computer security visualization designs X. Suo Suo, X. Y. Zhu Zhu, Y. G. Scott Owen Owen, G. Scott 53

Integrated environment management for information operations testbeds T. H. Yu Yu, T. H. B. W. Fuller Fuller, B. W. J. H. Bannick Bannick, J. H. L. M. Rossey Rossey, L. M. R. K. Cunningham Cunningham, R. K. 67

Visual analysis of network flow data with timelines and event plots D. Phan Phan, D. J. Gerth Gerth, J. M. Lee Lee, M. A. Paepcke Paepcke, A. T. Winograd Winograd, T. 85

NetBytes Viewer : an entity-based NetFlow visualization utility for identifying intrusive behavior T. Taylor Taylor, T. S. Brooks Brooks, S. J. McHugh McHugh, J. 101

Visual analysis of corporate network intelligence : abstracting and reasoning on yesterdays for acting today D. Lalanne Lalanne, D. E. Bertini Bertini, E. P. Hertzog Hertzog, P. P. Bados Bados, P. 115

Visualizing network security events using compound glyphs from a service-oriented perspective J. Pearlman Pearlman, J. P. Rheingans Rheingans, P. 131

High level Internet scale traffic visualization using Hilbert curve mapping B. Irwin Irwin, B. N. Pilkington Pilkington, N. 147

VisAlert : from idea to product S. Foresti Foresti, S. J. Agutter Agutter, J. 159

Visually understanding jam resistant communication D. Schweitzer Schweitzer, D. L. BairdBaird, L. W. Bahn Bahn, W. 175

Visualization of host behavior for network security F. Mansman Mansman, F. L. Meier Meier, L. D. A. Klein Klein, D. A. 187

Putting security in context : visual correlation of network activity with real-world information W. A. Pike Pike, W. A. C. Scherrer Scherrer, C. S. Zabriskie Zabriskie, S. 203

An interactive attack graph cascade and reachability display L. Williams Williams, L. R. Lippmann Lippmann, R. K. Ingols Ingols, K. 221

Intelligent classification and visualization of network scans C. Muelder Muelder, C. L. Chen Chen, L. R. Thomason Thomason, R. K.-L. Ma Ma, K.-L. T. Bartoletti Bartoletti, T. 237

Using InetVis to evaluate Snort and Bro Scan detection on a network telescope B. Irwn Irwn, B. J.-P. van Riel van Riel, J.-P. 255


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security, Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicat, Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security

X
WonderClub Home

This item is in your Collection

Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security, Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicat, Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security

Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security

X
WonderClub Home

This Item is in Your Inventory

Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security, Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicat, Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security

Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: