Author: United States. Congress
Publisher:
ISBN:
Category :
Languages : en
Pages : 2010
Book Description
Reports and Documents
Federal Evaluations
Author:
Publisher:
ISBN:
Category : Evaluation research (Social action programs)
Languages : en
Pages : 1216
Book Description
Contains an inventory of evaluation reports produced by and for selected Federal agencies, including GAO evaluation reports that relate to the programs of those agencies.
Publisher:
ISBN:
Category : Evaluation research (Social action programs)
Languages : en
Pages : 1216
Book Description
Contains an inventory of evaluation reports produced by and for selected Federal agencies, including GAO evaluation reports that relate to the programs of those agencies.
Network Security Through Data Analysis
Author: Michael S Collins
Publisher: "O'Reilly Media, Inc."
ISBN: 1449357865
Category : Computers
Languages : en
Pages : 416
Book Description
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting. Explore network, host, and service sensors for capturing security data Store data traffic with relational databases, graph databases, Redis, and Hadoop Use SiLK, the R language, and other tools for analysis and visualization Detect unusual phenomena through Exploratory Data Analysis (EDA) Identify significant structures in networks with graph analysis Determine the traffic that’s crossing service ports in a network Examine traffic volume and behavior to spot DDoS and database raids Get a step-by-step process for network mapping and inventory
Publisher: "O'Reilly Media, Inc."
ISBN: 1449357865
Category : Computers
Languages : en
Pages : 416
Book Description
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting. Explore network, host, and service sensors for capturing security data Store data traffic with relational databases, graph databases, Redis, and Hadoop Use SiLK, the R language, and other tools for analysis and visualization Detect unusual phenomena through Exploratory Data Analysis (EDA) Identify significant structures in networks with graph analysis Determine the traffic that’s crossing service ports in a network Examine traffic volume and behavior to spot DDoS and database raids Get a step-by-step process for network mapping and inventory
Emerging Trends in ICT Security
Author: Babak Akhgar
Publisher: Newnes
ISBN: 0124104878
Category : Computers
Languages : en
Pages : 662
Book Description
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. - Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures - Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks - Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
Publisher: Newnes
ISBN: 0124104878
Category : Computers
Languages : en
Pages : 662
Book Description
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. - Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures - Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks - Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
Report on the Use of Electronic Data-processing Equipment in the Federal Government, Eighty-sixth Congress, Second Session, Committee Print
Author: United States. Congress. House. Committee on Post Office and Civil Service
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 120
Book Description
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 120
Book Description
Federal Program Evaluations
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 776
Book Description
Contains an inventory of evaluation reports produced by and for selected Federal agencies, including GAO evaluation reports that relate to the programs of those agencies.
Publisher:
ISBN:
Category :
Languages : en
Pages : 776
Book Description
Contains an inventory of evaluation reports produced by and for selected Federal agencies, including GAO evaluation reports that relate to the programs of those agencies.
Report on the Use of Electronic Data-processing Equipment in the Federal Government, Eighty-sixth Congress, Second Session, Committee Print
Author: United States. Congress. House. Committee on Post Office and Civil Service. Subcommittee on Census and Statistics
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 120
Book Description
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 120
Book Description
A Bibliography of Documents Issued by the GAO on Matters Related to ADP, January 1976-December 1980
Author: United States. General Accounting Office
Publisher:
ISBN:
Category : Administrative agencies
Languages : en
Pages : 474
Book Description
Publisher:
ISBN:
Category : Administrative agencies
Languages : en
Pages : 474
Book Description
A Bibliography of Documents Issued by the GAO on Matters Related to ADP
Author: United States. General Accounting Office
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 472
Book Description
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 472
Book Description
GAO Documents
Author: United States. General Accounting Office
Publisher:
ISBN:
Category :
Languages : en
Pages : 948
Book Description
Catalog of reports, decisions and opinions, testimonies and speeches.
Publisher:
ISBN:
Category :
Languages : en
Pages : 948
Book Description
Catalog of reports, decisions and opinions, testimonies and speeches.