Data-Driven Security Analysis, Visualization and Dashboards
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'...
Saved in:
| Main Author: | Jacobs, Jay |
|---|---|
| Other Authors: | Rudis, Bob |
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley
2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Designing security architecture solutions
by: Ramachandran, Jay
Published: (2002)
by: Ramachandran, Jay
Published: (2002)
Data driven systems modeling
by: Planche
Published: (1991)
by: Planche
Published: (1991)
Security awareness applying practical security in your world
by: Ciampa
Published: (2004)
by: Ciampa
Published: (2004)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer and information security
Published: (2016)
Published: (2016)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Computer security art and science
by: Bishop, Matt
Published: (2019)
by: Bishop, Matt
Published: (2019)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2015)
by: Stallings, William, et al.
Published: (2015)
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)
by: Stamp, Mark
Published: (2022)
Computer security art and science
by: Bishop lhMatt
by: Bishop lhMatt
Event-driven programming in visual basic.Net
Published: (2004)
Published: (2004)
Identity and data security for web development best practices
by: LeBlanc, Jonathan, et al.
Published: (2016)
by: LeBlanc, Jonathan, et al.
Published: (2016)
Computer security basics
by: Lehtinen, Rick
Published: (2006)
by: Lehtinen, Rick
Published: (2006)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013)
by: Raggo, Michael T.
Published: (2013)
Information security culture a human firewall approach
by: Omar Zakaria
Published: (2013)
by: Omar Zakaria
Published: (2013)
Windows security monitoring scenarios and patterns
by: Miroshnikov, Andreĭ
Published: (2018)
by: Miroshnikov, Andreĭ
Published: (2018)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Fundamentals of computer security technology
by: Amoroso
Published: (1994)
by: Amoroso
Published: (1994)
Wireshark for security professionals using Wireshark and the Metasploit Framework
by: Bullock, Jessey, et al.
Published: (2017)
by: Bullock, Jessey, et al.
Published: (2017)
Information security architecture an integrated approach to security in the organization
by: Tudor, Jan Killmeyer
Published: (2006)
by: Tudor, Jan Killmeyer
Published: (2006)
Computer security literacy staying safe in a digital world
by: Jacobson, Douglas
Published: (2013)
by: Jacobson, Douglas
Published: (2013)
Securing PHP Apps
by: Edmunds, Ben
Published: (2016)
by: Edmunds, Ben
Published: (2016)
Computer Security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Managing information security
Published: (2014)
Published: (2014)
Computer communications security
by: Ford lhWarwick
by: Ford lhWarwick
Empirical research for software security foundations and experience
Published: (2018)
Published: (2018)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Securing client/server computer networks
by: Davis
Published: (1996)
by: Davis
Published: (1996)
Security, privacy, and forensics issues in big data
Published: (2020)
Published: (2020)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Information Security Risk Management for Iso27001/Iso 27002
by: Calder, Alan
Published: (2019)
by: Calder, Alan
Published: (2019)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
Developments in information security and cybernetic wars
Published: (2019)
Published: (2019)
Security architecture design,deployment and operations
by: King lhChristopher M
by: King lhChristopher M
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Similar Items
-
Designing security architecture solutions
by: Ramachandran, Jay
Published: (2002) -
Data driven systems modeling
by: Planche
Published: (1991) -
Security awareness applying practical security in your world
by: Ciampa
Published: (2004) -
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013) -
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)


