| 000 | 04228cam a2200577 i 4500 | ||
|---|---|---|---|
| 999 |
_c10172 _d10172 |
||
| 001 | 896901266 | ||
| 005 | 20210418120712.0 | ||
| 006 | m d | ||
| 007 | cr ||||||||||| | ||
| 008 | 141006s2015 maua o 000 0 eng d | ||
| 015 |
_aGBB4D1374 _2bnb |
||
| 015 |
_aGBB4C9335 _2bnb |
||
| 020 | _a9780128002070 (pbk.) | ||
| 020 | _a9780128005064 | ||
| 020 | _a0128005068 | ||
| 035 | _a.b38095622 | ||
| 035 |
_a(OCoLC)896901266 _z(OCoLC)899607334 |
||
| 037 |
_aCL0500000525 _bSafari Books Online |
||
| 037 |
_aF5A4F859-DEFE-4DC9-AD2C-D30043616D68 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 040 |
_aUKMGB _beng _cUKMGB _dOCLCO _dN$T _dYDXCP _dUIU _dN$T _dUMI _dTEFOD _erda |
||
| 050 | 4 |
_aQA76.9.A25 _bT3358 2015 |
|
| 072 | 7 |
_aCOM _x060040 _2bisacsh |
|
| 072 | 7 |
_aCOM _x043050 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _223 _bI |
| 100 | 1 |
_aTalabis, Mark, _eauthor. |
|
| 245 | 1 | 0 |
_aInformation security analytics : _bfinding security insights, patterns, and anomalies in big data / _cMark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor. |
| 264 | 1 |
_aMassachusetts : _bSyngress, _c2015. |
|
| 300 |
_axv, 166 pages : _billustrations ; _c24 cm. |
||
| 336 |
_atext _2rdacontent. |
||
| 336 |
_astill image _2rdacontent. |
||
| 337 |
_acomputer _2rdamedia. |
||
| 338 |
_aonline resource _2rdacarrier. |
||
| 500 | _acomputer bookfair2016 | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aChapter 1: Analytics Defined Chapter 2: Primer on Analytics Software and Tools Chapter 3: Analytics and Incident Response Chapter 4: Simulations and Security Processes Chapter 5: Access Analytics Chapter 6: Technical Risk Profiling Chapter 7: Security Intelligence and Next Steps | |
| 506 | _aAvailable to OhioLINK libraries. | ||
| 520 | _aInformation Security Analytics gives you insights into the practice of analytics and more importantly analytic techniques to identify trends and outliers, which may not be possible using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you to mine data and to identify patterns and relationships in security data. Using the techniques covered in this book, you will be able to gain security insight into unstructured data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques using case studies. They demonstrate how you can use freely available tools to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks in your organization. Written by security practitioners, for security practitioners, Learn about open-source analytics and statistical packages, tools and applications, Real-world case studies and scenarios are provided for each analytics technique, Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided, Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes, Learn how to utilize big data techniques to assist in incident response and intrusion analysis Book jacket. | ||
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aInformation resources management _xSecurity measures. |
|
| 650 | 0 |
_aBig data _xSecurity measures. |
|
| 655 | 4 | _aElectronic books. | |
| 700 | 1 |
_aMcPherson, Robert, _eauthor. |
|
| 700 | 1 |
_aMiyamoto, I, _eauthor. |
|
| 700 | 1 |
_aMartin, Jason L., _eauthor. |
|
| 710 | 2 | _aOhio Library and Information Network. | |
| 776 | 0 | 8 |
_iPrint version: _z9780128002070. |
| 856 |
_3Abstract _uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3650 |
||
| 942 |
_2ddc _cBK |
||