Network security has operated in the realm of configuration files, pull-down menus, and traffic traces, making it arcane and tricky to tackle. In many instances, graphical presentation of information can highlight aspects that are not readily obvious using non-graphical presentation.
This book takes a look at some of the available techniques and the different areas where graphical presentation can make a difference. Not surprisingly, the book is full of images highlighting these methodologies.
The book starts with coverage of binary file visualization tools with a highlight on security. This is similar to the remaining sections that have a heavy bent on security. It takes a look at a number of tools including Nessus, an open source vulnerability assessment tool, and Metasploit, a tool for those performing penetration testing, IDS signature development, and exploit research. The book then presents tools for log file analysis.
I like the fact that barely a stone is left unturned — even attacking and defending these visualization systems is addressed. That’s important, since they are often incorporated into a network’s protection system.
Since this is a growing area, the last chapter addresses "Teaching Yourself," to enable readers to keep up with developments. The book is an excellent starting point, especially for those unfamiliar with the tools and problems. If you are dealing with networks at the programming or management level, then this book needs to be on your shelf.
Comments
Comments