Cargando…

Data-Driven Security : Analysis, Visualization and Dashboards.

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Jacobs, Jay (Data analyst)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Wiley, 2014.
©2014
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn868963701
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 140124s2014 xx ob 000 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d EBLCP  |d MHW  |d E7B  |d CCO  |d OCLCO  |d UMI  |d LLB  |d N$T  |d YDXCP  |d COO  |d DEBSZ  |d DEBBG  |d OCLCQ  |d B24X7  |d TEFOD  |d OCLCF  |d OCLCQ  |d TEFOD  |d OCLCQ  |d CNNOR  |d MOR  |d LIP  |d PIFPO  |d ZCU  |d NRC  |d LIV  |d MERUC  |d OCLCQ  |d SAV  |d TXI  |d U3W  |d OCLCA  |d REB  |d STF  |d CEF  |d NRAMU  |d CRU  |d ICG  |d VTS  |d OCLCQ  |d INT  |d VT2  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d AJB  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBB3B8077  |2 bnb 
016 7 |a 016589088  |2 Uk 
019 |a 875668631  |a 876279199  |a 961595695  |a 962635742  |a 990459793  |a 1055363401  |a 1065924363  |a 1081247658  |a 1103269811  |a 1120862764  |a 1129356584  |a 1153038042  |a 1192344590  |a 1228547117  |a 1240521126  |a 1244444418  |a 1244449430  |a 1249231108 
020 |a 130637376X  |q (electronic bk.) 
020 |a 9781306373760  |q (electronic bk.) 
020 |a 9781118793664  |q (electronic bk.) 
020 |a 1118793668  |q (electronic bk.) 
020 |a 9781118793824  |q (electronic bk.) 
020 |a 111879382X  |q (electronic bk.) 
020 |a 1118793722 
020 |a 9781118793725 
020 |z 111879382X 
020 |z 1118793722 
020 |z 9781118793725 
024 3 |a 9781118793725 
029 1 |a AU@  |b 000052839770 
029 1 |a AU@  |b 000053038274 
029 1 |a AU@  |b 000060079267 
029 1 |a CHNEW  |b 000694613 
029 1 |a CHNEW  |b 000694617 
029 1 |a CHNEW  |b 000886754 
029 1 |a DEBBG  |b BV042032145 
029 1 |a DEBBG  |b BV043607185 
029 1 |a DEBSZ  |b 405574274 
029 1 |a DEBSZ  |b 41417612X 
029 1 |a NZ1  |b 15494100 
035 |a (OCoLC)868963701  |z (OCoLC)875668631  |z (OCoLC)876279199  |z (OCoLC)961595695  |z (OCoLC)962635742  |z (OCoLC)990459793  |z (OCoLC)1055363401  |z (OCoLC)1065924363  |z (OCoLC)1081247658  |z (OCoLC)1103269811  |z (OCoLC)1120862764  |z (OCoLC)1129356584  |z (OCoLC)1153038042  |z (OCoLC)1192344590  |z (OCoLC)1228547117  |z (OCoLC)1240521126  |z (OCoLC)1244444418  |z (OCoLC)1244449430  |z (OCoLC)1249231108 
037 |a 568627  |b MIL 
037 |a F3B983D7-0726-4F76-B193-6EC182E66948  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Jacobs, Jay  |c (Data analyst) 
245 1 0 |a Data-Driven Security :  |b Analysis, Visualization and Dashboards. 
260 |b Wiley,  |c 2014. 
264 4 |c ©2014 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma. 
504 |a Includes bibliographical references. 
505 0 |a Introduction; Chapter 1: The Journey to Data-Driven Security; A Brief History of Learning from Data; Gathering Data Analysis Skills; Centering on a Question; Summary; Recommended Reading; Chapter 2: Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis; Why Python? Why R? And Why Both?; Jumpstarting Your Python Analytics with Canopy; Introducing Data Frames; Organizing Analyses; Summary; Recommended Reading; Chapter 3: Learning the Hello World of Security Data Analysis; Solving a Problem; Getting Data; Reading In Data; Exploring Data; Homing In on a Question. 
505 8 |a Considerations in a Data Collection FrameworkAn Introduction to VERIS; Seeing VERIS in Action; Working with VCDB Data; Summary; Recommended Reading; Chapter 8: Breaking Up With Your Relational Database; Realizing the Container Has Constraints; Exploring Alternative Data Stores; Summary; Recommended Reading; Chapter 9: Demystifying Machine Learning; Detecting Malware; Benefiting from Machine Learning; Specific Learning Methods; Hands On: Clustering Breach Data; Summary; Recommended Reading; Chapter 10: Designing Effective Security Dashboards; What Is a Dashboard, Anyway? 
505 8 |a Chapter 11Chapter 12; R Packages Used. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
758 |i has work:  |a Data-driven security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGKF6X8697py6cm8KJ8cj3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9781306373760 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118793824/?ar  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1599321  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26130070 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26130059 
938 |a Books 24x7  |b B247  |n bks00062619 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4038744 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1599321 
938 |a ebrary  |b EBRY  |n ebr10829790 
938 |a EBSCOhost  |b EBSC  |n 688378 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis27386385 
938 |a YBP Library Services  |b YANK  |n 11597402 
938 |a YBP Library Services  |b YANK  |n 12677317 
994 |a 92  |b IZTAP