Data-Driven Security : Analysis, Visualization and Dashboards.
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Wiley,
2014.
©2014 |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn868963701 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 140124s2014 xx ob 000 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d EBLCP |d MHW |d E7B |d CCO |d OCLCO |d UMI |d LLB |d N$T |d YDXCP |d COO |d DEBSZ |d DEBBG |d OCLCQ |d B24X7 |d TEFOD |d OCLCF |d OCLCQ |d TEFOD |d OCLCQ |d CNNOR |d MOR |d LIP |d PIFPO |d ZCU |d NRC |d LIV |d MERUC |d OCLCQ |d SAV |d TXI |d U3W |d OCLCA |d REB |d STF |d CEF |d NRAMU |d CRU |d ICG |d VTS |d OCLCQ |d INT |d VT2 |d OCLCQ |d WYU |d G3B |d TKN |d OCLCQ |d UAB |d DKC |d AU@ |d OCLCQ |d UKAHL |d OCLCQ |d BRF |d OCLCO |d OCLCQ |d AJB |d OCLCQ |d OCLCO |d OCLCL | ||
015 | |a GBB3B8077 |2 bnb | ||
016 | 7 | |a 016589088 |2 Uk | |
019 | |a 875668631 |a 876279199 |a 961595695 |a 962635742 |a 990459793 |a 1055363401 |a 1065924363 |a 1081247658 |a 1103269811 |a 1120862764 |a 1129356584 |a 1153038042 |a 1192344590 |a 1228547117 |a 1240521126 |a 1244444418 |a 1244449430 |a 1249231108 | ||
020 | |a 130637376X |q (electronic bk.) | ||
020 | |a 9781306373760 |q (electronic bk.) | ||
020 | |a 9781118793664 |q (electronic bk.) | ||
020 | |a 1118793668 |q (electronic bk.) | ||
020 | |a 9781118793824 |q (electronic bk.) | ||
020 | |a 111879382X |q (electronic bk.) | ||
020 | |a 1118793722 | ||
020 | |a 9781118793725 | ||
020 | |z 111879382X | ||
020 | |z 1118793722 | ||
020 | |z 9781118793725 | ||
024 | 3 | |a 9781118793725 | |
029 | 1 | |a AU@ |b 000052839770 | |
029 | 1 | |a AU@ |b 000053038274 | |
029 | 1 | |a AU@ |b 000060079267 | |
029 | 1 | |a CHNEW |b 000694613 | |
029 | 1 | |a CHNEW |b 000694617 | |
029 | 1 | |a CHNEW |b 000886754 | |
029 | 1 | |a DEBBG |b BV042032145 | |
029 | 1 | |a DEBBG |b BV043607185 | |
029 | 1 | |a DEBSZ |b 405574274 | |
029 | 1 | |a DEBSZ |b 41417612X | |
029 | 1 | |a NZ1 |b 15494100 | |
035 | |a (OCoLC)868963701 |z (OCoLC)875668631 |z (OCoLC)876279199 |z (OCoLC)961595695 |z (OCoLC)962635742 |z (OCoLC)990459793 |z (OCoLC)1055363401 |z (OCoLC)1065924363 |z (OCoLC)1081247658 |z (OCoLC)1103269811 |z (OCoLC)1120862764 |z (OCoLC)1129356584 |z (OCoLC)1153038042 |z (OCoLC)1192344590 |z (OCoLC)1228547117 |z (OCoLC)1240521126 |z (OCoLC)1244444418 |z (OCoLC)1244449430 |z (OCoLC)1249231108 | ||
037 | |a 568627 |b MIL | ||
037 | |a F3B983D7-0726-4F76-B193-6EC182E66948 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |
049 | |a UAMI | ||
100 | 1 | |a Jacobs, Jay |c (Data analyst) | |
245 | 1 | 0 | |a Data-Driven Security : |b Analysis, Visualization and Dashboards. |
260 | |b Wiley, |c 2014. | ||
264 | 4 | |c ©2014 | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
520 | |a Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma. | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Introduction; Chapter 1: The Journey to Data-Driven Security; A Brief History of Learning from Data; Gathering Data Analysis Skills; Centering on a Question; Summary; Recommended Reading; Chapter 2: Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis; Why Python? Why R? And Why Both?; Jumpstarting Your Python Analytics with Canopy; Introducing Data Frames; Organizing Analyses; Summary; Recommended Reading; Chapter 3: Learning the Hello World of Security Data Analysis; Solving a Problem; Getting Data; Reading In Data; Exploring Data; Homing In on a Question. | |
505 | 8 | |a Considerations in a Data Collection FrameworkAn Introduction to VERIS; Seeing VERIS in Action; Working with VCDB Data; Summary; Recommended Reading; Chapter 8: Breaking Up With Your Relational Database; Realizing the Container Has Constraints; Exploring Alternative Data Stores; Summary; Recommended Reading; Chapter 9: Demystifying Machine Learning; Detecting Malware; Benefiting from Machine Learning; Specific Learning Methods; Hands On: Clustering Breach Data; Summary; Recommended Reading; Chapter 10: Designing Effective Security Dashboards; What Is a Dashboard, Anyway? | |
505 | 8 | |a Chapter 11Chapter 12; R Packages Used. | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
758 | |i has work: |a Data-driven security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGKF6X8697py6cm8KJ8cj3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9781306373760 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118793824/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1599321 |z Texto completo |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26130070 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26130059 | ||
938 | |a Books 24x7 |b B247 |n bks00062619 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL4038744 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1599321 | ||
938 | |a ebrary |b EBRY |n ebr10829790 | ||
938 | |a EBSCOhost |b EBSC |n 688378 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis27386385 | ||
938 | |a YBP Library Services |b YANK |n 11597402 | ||
938 | |a YBP Library Services |b YANK |n 12677317 | ||
994 | |a 92 |b IZTAP |