Showing posts with label classic. Show all posts
Showing posts with label classic. Show all posts

7/15/2012

Security Data Visualization: Graphical Techniques for Network Analysis Review

Security Data Visualization: Graphical Techniques for Network Analysis
Average Reviews:

(More customer reviews)
Security Data Visualization (SDV) is a great book. It's perfect for readers familiar with security who are looking to add new weapons to their defensive arsenals. Even offensive players will find something to like in SDV. The book is essentially an introduction to the field, but it is well-written, organized, and clear. I recommend all security analysts read SDV.
I give five star reviews to books that meet certain criteria. First, the book should change the way I look at a problem, or properly introduce me to thinking about a problem for which I have little or no frame of reference. Although I have been a security analyst for ten years, I have little visualization experience. Author Greg Conti spent just the right amount of time explaining the field, describing key terms (preattentive processing, occlusion, brushing) and displays (star plots, small multiples, TreeMaps). I loved the author's mention of Ben Shneiderman's visualization mantra: "overview first, zoom and filter, details on demand" (p 14).
Second, a five star book should have few or no technical errors. SDV was as sound as they come, at least as far as the security and networking information goes. I can't comment on the author's synthesis of the visualization community. I also liked the case studies in Chs 3, 4, and 5. I liked reading the visualization methodology introduced in the chapter on analyzing firewall logs (Ch 7).
Third, a five star book will make the material actionable. I finished SDV thinking I could try at least some of what I read on my own network. Ch 10 talked about how to build your own visualization tool. I would have liked additional detail on using some of the tools in the book, so perhaps a future edition will expand on that point.
A fourth feature of great books is including current research and referencing outside sources. SDV cited many foundational papers and presentations on visualization in general and security visualization specifically. Chs 6 and 12 addressed these subjects in detail. Ch 11 presented readers with ideas for future projects.
Overall, it should be obvious I really enjoyed reading SDV. My only real complaint seems inherent to the field: how to analyze large data sets. The case study in Ch 5 ("One Night on My ISP") only looks at 303 packets. It is easy to dismiss it since there's hardly any data to analyze. However, I feel that the author's techniques can be creatively scaled if one maintains realistic expectations. SDV is an excellent introduction to the security visualization field and I hope to see other works from the author and others on this important topic.

Click Here to see more reviews about: Security Data Visualization: Graphical Techniques for Network Analysis


Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence.

Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities.

Security Data Visualization is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and how worms and viruses propagate.

You'll learn how to use visualization techniques to:
Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document Gain insight into large amounts of low-level packet data Identify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacks View the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespread network attacks View and analyze firewall and intrusion detection system (IDS) logs
Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective


Buy Now

Click here for more information about Security Data Visualization: Graphical Techniques for Network Analysis

Read More...

10/17/2011

Advanced Kalman Filtering, Least-Squares and Modeling: A Practical Handbook Review

Advanced Kalman Filtering, Least-Squares and Modeling: A Practical Handbook
Average Reviews:

(More customer reviews)
The most thorough and complete work I have seen on the subject. This provides a lot of in-depth information and insight into various areas not found elsewhere. While quite a bit of theory is presented, the main concentration is providing practical information useful for a wide variety of filter implementations. This will be most useful for somebody with a strong mathematical background, particularly in linear algebra, who is looking for a comprehensive understanding and the best solution for a particular application.

Click Here to see more reviews about: Advanced Kalman Filtering, Least-Squares and Modeling: A Practical Handbook

This book provides a complete explanation of estimation theory andapplication, modeling approaches, and model evaluation. Each topicstarts with a clear explanation of the theory (often includinghistorical context), followed by application issues that should beconsidered in the design. Different implementations designed to addressspecific problems are presented, and numerous examples of varyingcomplexity are used to demonstrate the concepts.This book is intended primarily as a handbook for engineers who must design practical systems. Its primarygoal is to explain all important aspects of Kalman filtering and least-squares theory and application. Discussion of estimator design and model development is emphasized so that the reader may develop an estimator that meets all application requirements and is robust to modeling assumptions. Since it is sometimes difficult to a priori determine the best model structure, use of exploratory data analysis to define model structure is discussed. Methods for deciding on the "best" model are also presented. A second goal is to present little known extensions of least squares estimation or Kalman filtering that provide guidance on model structure and parameters, or make the estimator more robust to changes in real-world behavior.A third goal is discussion of implementation issues that make the estimator more accurate or efficient, or that make it flexible so that model alternatives can be easily compared.The fourth goal is to provide the designer/analyst with guidance in evaluating estimator performance and in determining/correcting problems.The final goal is to provide a subroutine library that simplifies implementation, and flexible general purpose high-level drivers that allow both easy analysis of alternative models and access to extensions of the basic filtering.

Buy NowGet 23% OFF

Click here for more information about Advanced Kalman Filtering, Least-Squares and Modeling: A Practical Handbook

Read More...

9/03/2011

Stop Staring: Facial Modeling and Animation Done Right Review

Stop Staring: Facial Modeling and Animation Done Right
Average Reviews:

(More customer reviews)
Brilliant concepts and discussion of details, but somewhat slow in painting the big picture. He never really comes out and says it, so I will. The end result is a control rig for 40 blend shapes, each painstakingly hand drawn and tuned. The state of the art doesn't allow shortcuts; I don't think it ever can or will. If you can accept that all 40 shapes are needed to model the range of human facial expression, this book is for you. Osipa makes a compelling argument that each is necessary; guides you through the modeling to make it possible; and wraps up with an elegant rig to control and manage them all. The result is a talking head, simply amazing in its range and control of nuance. Still, 40 heads per character is a huge investment. Is it worth "Doing Right?" Or can you continue to fake it? Buy the book; play with the rig; and find out for yourself.

Click Here to see more reviews about: Stop Staring: Facial Modeling and Animation Done Right



Buy NowGet 39% OFF

Click here for more information about Stop Staring: Facial Modeling and Animation Done Right

Read More...