35986841_10216840653711318_1105697261150535680_n
Local cover image
Local cover image
Amazon cover image
Image from Amazon.com

Information security analytics : finding security insights, patterns, and anomalies in big data / Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor

By: Contributor(s): Material type: TextTextPublisher: Massachusetts : Syngress, 2015Edition: 1st edDescription: 1 online resourceContent type:
  • text
  • still image
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780128005064
  • 0128005068
Subject(s): Genre/Form: Additional physical formats: Print version:: No titleDDC classification:
  • 001.64 23
LOC classification:
  • QA76.9.A25 T3358 2015
Online resources: Summary: Information Security Analytics gives you insights into the practice of analytics and more importantly analytic techniques to identify trends and outliers, which may not be possible using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you to mine data and to identify patterns and relationships in security data. Using the techniques covered in this book, you will be able to gain security insight into unstructured data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques using case studies. They demonstrate how you can use freely available tools to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks in your organization. Written by security practitioners, for security practitioners, Learn about open-source analytics and statistical packages, tools and applications, Real-world case studies and scenarios are provided for each analytics technique, Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided, Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes, Learn how to utilize big data techniques to assist in incident response and intrusion analysis Book jacket
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books Centeral Library Second Floor - Computer Sciences 001.64 T.M.I 2015 (Browse shelf(Opens below)) Available 24007
Browsing Centeral Library shelves, Shelving location: Second Floor - Computer Sciences Close shelf browser (Hides shelf browser)
001.64 G.R.P 1980 Personal Programming 001.64 S.P.I 2015 Information security and cyber laws / 001.64 S.V.M 2014 Mobile Computing 001.64 T.M.I 2015 Information security analytics 001.642 F.R.S 1985 Software engineering concepts / 001.642 T.C.E 1978 8080/8085 software design / 001.6424 M.A.B 1981 BASIC programs for scientists and engineers /

Includes bibliographical references and index

Available to OhioLINK libraries

Information Security Analytics gives you insights into the practice of analytics and more importantly analytic techniques to identify trends and outliers, which may not be possible using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you to mine data and to identify patterns and relationships in security data. Using the techniques covered in this book, you will be able to gain security insight into unstructured data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques using case studies. They demonstrate how you can use freely available tools to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks in your organization. Written by security practitioners, for security practitioners, Learn about open-source analytics and statistical packages, tools and applications, Real-world case studies and scenarios are provided for each analytics technique, Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided, Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes, Learn how to utilize big data techniques to assist in incident response and intrusion analysis Book jacket

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image