000 03403cam a2200601Ii 4500
001 ocn896901266
003 OCoLC
005 20190328114809.0
006 m o d
007 cr mn|||||||||
008 141006t20152015maua ob 001 0 eng d
040 _aUKMGB
_beng
_erda
_epn
_cUKMGB
_dOCLCO
_dN$T
_dYDXCP
_dUIU
_dN$T
_dUMI
_dTEFOD
_dCOO
_dWAU
_dDEBBG
_dB24X7
_dSTF
_dDEBSZ
_dTEFOD
_dOCLCQ
_dOSU
_dOCLCQ
_dVGM
_dLIV
_dOCLCA
_dBUF
_dOCLCF
_dU3W
_dD6H
_dINT
_dOCLCQ
016 7 _a016947801
_2Uk
016 7 _a016945760
_2Uk
019 _a899607334
_a963737788
_a966848495
020 _a9780128005064
_q(electronic bk.)
020 _a0128005068
_q(electronic bk.)
020 _z9780128002070
_q(pbk.)
020 _z0128002077
_q(pbk.)
035 _a(OCoLC)896901266
_z(OCoLC)899607334
_z(OCoLC)963737788
_z(OCoLC)966848495
050 4 _aQA76.9.A25
_bT3358 2015
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aTalabis, Mark,
_eauthor.
245 1 0 _aInformation security analytics : finding security insights, patterns, and anomalies in big data /
_h[electronic resource]
_cMark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor.
264 1 _aWaltham, MA :
_bSyngress,
_c[2015]
264 4 _c�2015
300 _a1 online resource (xv, 166 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
520 _aThe authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --
_cEdited summary from book.
504 _aIncludes bibliographical references and index.
505 0 _aAnalytics Defined -- Primer on Analytical Software and Tools -- Analytics and Incident Response -- Simulations and Security Processes -- Access Analytics -- Security and Text Mining -- Security Intelligence and Next Steps.
588 0 _aPrint version record.
650 0 _aComputer security.
650 0 _aInformation resources management
_xSecurity measures.
650 0 _aBig data
_xSecurity measures.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
650 7 _aInformation resources management
_xSecurity measures.
_2fast
_0(OCoLC)fst00972614
655 4 _aElectronic books.
655 7 _aElectronic books.
_2lcgft
700 1 _aMcPherson, Robert,
_eauthor.
700 1 _aMiyamoto, I,
_eauthor.
700 1 _aMartin, Jason L.,
_eauthor.
776 0 8 _iPrint version:
_aTalabis, Mark Ryan M.
_tInformation Security Analytics.
_dWaltham, MA : Syngress, [2015]
_z9780128002070
_w(OCoLC)903214048
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128002070
999 _c247010
_d247010