Chapter 9. Data Visualization Tools
Throughout this book, I have used various tools to generate graphical representations of log files and security data. In some instances, I have shown how to configure the tools to generate the visualization. What this chapter does is summarize a huge set of mostly freely available tools that you can use to generate your own graphs. At the end of this chapter, you will find a big table that summarizes all the tools and shows their capabilities side by side.
Pay attention while you are reading through the descriptions of all these tools. You will realize that there is no one tool that I deem “the best” for visualizing data. They all have things they do well, but they also have shortcomings and lack one feature ...
Get Applied Security Visualization now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.