000 04228cam a2200577 i 4500
999 _c10172
_d10172
001 896901266
005 20210418120712.0
006 m d
007 cr |||||||||||
008 141006s2015 maua o 000 0 eng d
015 _aGBB4D1374
_2bnb
015 _aGBB4C9335
_2bnb
020 _a9780128002070 (pbk.)
020 _a9780128005064
020 _a0128005068
035 _a.b38095622
035 _a(OCoLC)896901266
_z(OCoLC)899607334
037 _aCL0500000525
_bSafari Books Online
037 _aF5A4F859-DEFE-4DC9-AD2C-D30043616D68
_bOverDrive, Inc.
_nhttp://www.overdrive.com
040 _aUKMGB
_beng
_cUKMGB
_dOCLCO
_dN$T
_dYDXCP
_dUIU
_dN$T
_dUMI
_dTEFOD
_erda
050 4 _aQA76.9.A25
_bT3358 2015
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
_bI
100 1 _aTalabis, Mark,
_eauthor.
245 1 0 _aInformation security analytics :
_bfinding security insights, patterns, and anomalies in big data /
_cMark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor.
264 1 _aMassachusetts :
_bSyngress,
_c2015.
300 _axv, 166 pages :
_billustrations ;
_c24 cm.
336 _atext
_2rdacontent.
336 _astill image
_2rdacontent.
337 _acomputer
_2rdamedia.
338 _aonline resource
_2rdacarrier.
500 _acomputer bookfair2016
504 _aIncludes bibliographical references and index.
505 0 _aChapter 1: Analytics Defined Chapter 2: Primer on Analytics Software and Tools Chapter 3: Analytics and Incident Response Chapter 4: Simulations and Security Processes Chapter 5: Access Analytics Chapter 6: Technical Risk Profiling Chapter 7: Security Intelligence and Next Steps
506 _aAvailable to OhioLINK libraries.
520 _aInformation Security Analytics gives you insights into the practice of analytics and more importantly analytic techniques to identify trends and outliers, which may not be possible using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you to mine data and to identify patterns and relationships in security data. Using the techniques covered in this book, you will be able to gain security insight into unstructured data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques using case studies. They demonstrate how you can use freely available tools to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks in your organization. Written by security practitioners, for security practitioners, Learn about open-source analytics and statistical packages, tools and applications, Real-world case studies and scenarios are provided for each analytics technique, Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided, Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes, Learn how to utilize big data techniques to assist in incident response and intrusion analysis Book jacket.
650 0 _aComputer security.
650 0 _aInformation resources management
_xSecurity measures.
650 0 _aBig data
_xSecurity measures.
655 4 _aElectronic books.
700 1 _aMcPherson, Robert,
_eauthor.
700 1 _aMiyamoto, I,
_eauthor.
700 1 _aMartin, Jason L.,
_eauthor.
710 2 _aOhio Library and Information Network.
776 0 8 _iPrint version:
_z9780128002070.
856 _3Abstract
_uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3650
942 _2ddc
_cBK