O'Reilly logo

Applied Security Visualization by Raffael Marty

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. From Data to Graphs

The previous chapters discussed the building blocks of visualization. We discussed some of the most common data sources. The discussion showed what kind of information the log files contain and what the differences are between the different data sources. We then looked at graphical representations of data. The graph selection process then helped choosing the right graph for the data and use-case at hand.

This chapter brings the previous ones together and shows the steps involved in successfully transforming textual data into graphical representations. It introduces a process that helps you to systematically define your problem, choose the data needed, transform the data, and finally arrive at a graphical representation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required