Data-Driven Security Analysis, Visualization and Dashboards
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley
2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 100756 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025550.0 | ||
| 008 | 141013s2014 inua bi 000 0 eng d | ||
| 020 | |a 9781118793725 (pbk) | ||
| 020 | |a 9781118793664 (ebk) | ||
| 020 | |a 9781118793824 (ebk) | ||
| 039 | 9 | |a 201503301002 |b zul |c 201411191110 |d shahrim |y 201410131516 |z hasniza | |
| 040 | |a UPNM | ||
| 090 | |a QA 76.9 .A25 |b .J34 2014 | ||
| 100 | 1 | |a Jacobs, Jay | |
| 245 | 1 | 0 | |a Data-Driven Security |b Analysis, Visualization and Dashboards |c Jay Jacobs, Bob Rudis |
| 260 | |a Indianapolis, IN |b Wiley |c 2014 | ||
| 300 | |a xix, 331 p. |b ill. (some col.) |c 24 cm. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Introduction -- Chapter 1. The Journey to Data-Driven Security -- 19 Chapter 2. Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis -- Chapter 3. Learning the "Hello World" of Security Data Analysis -- Chapter 4. Performing Exploratory Security Data Analysis -- Chapter 5. From Maps to Regression -- Chapter 6. Visualizing Security Data -- Chapter 7. Learning from Security Breaches -- Chapter 8. Breaking Up with Your Relational Database -- Chapter 9. Demystifying Machine Learning -- Chapter 10. Designing Effective Security Dashboards -- Chapter 11. Building Interactive Security Visualizations -- Chapter 12. Moving Toward Data-Driven Security -- Appendix A Resources and Tools -- Appendix B References -- Index. | |
| 520 | |a Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma. | ||
| 592 | |a 00013727 |b 04/11/2014 |c RM199.80 |h PVK | ||
| 650 | 0 | |a Computer security. | |
| 700 | 1 | |a Rudis, Bob | |
| 999 | |a vtls000052917 |c 100756 |d 100756 | ||


