Talabis, Mark,
Information security analytics : finding security insights, patterns, and anomalies in big data / [electronic resource] Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor. - 1 online resource (xv, 166 pages) : illustrations
Includes bibliographical references and index.
Analytics Defined -- Primer on Analytical Software and Tools -- Analytics and Incident Response -- Simulations and Security Processes -- Access Analytics -- Security and Text Mining -- Security Intelligence and Next Steps.
The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --
9780128005064 0128005068
016947801 Uk 016945760 Uk
Computer security.
Information resources management--Security measures.
Big data--Security measures.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Computer security.
Information resources management--Security measures.
Electronic books.
Electronic books.
QA76.9.A25 / T3358 2015
005.8
Information security analytics : finding security insights, patterns, and anomalies in big data / [electronic resource] Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor. - 1 online resource (xv, 166 pages) : illustrations
Includes bibliographical references and index.
Analytics Defined -- Primer on Analytical Software and Tools -- Analytics and Incident Response -- Simulations and Security Processes -- Access Analytics -- Security and Text Mining -- Security Intelligence and Next Steps.
The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --
9780128005064 0128005068
016947801 Uk 016945760 Uk
Computer security.
Information resources management--Security measures.
Big data--Security measures.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Computer security.
Information resources management--Security measures.
Electronic books.
Electronic books.
QA76.9.A25 / T3358 2015
005.8