Cargando…

Information security analytics : finding security insights, patterns, and anomalies in big data /

Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Talabis, Mark Ryan M. (Autor), McPherson, Robert (Autor), Miyamoto, I (Autor), Martin, Jason L. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, [2015]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn910911974
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 150108s2015 maua ob 001 0 eng d
040 |a UAB  |b eng  |e rda  |e pn  |c UAB  |d OCLCO  |d EBLCP  |d REB  |d DEBSZ  |d MERUC  |d OCLCA  |d OCLCF  |d OCLCQ  |d CEF  |d OCLCQ  |d CUY  |d ZCU  |d ICG  |d DKC  |d AU@  |d OCLCQ  |d WAU  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 897641309 
020 |a 9780128005064 
020 |a 0128005068 
020 |z 9780128002070 
029 1 |a CHNEW  |b 000889432 
029 1 |a CHNEW  |b 001001085 
029 1 |a DEBBG  |b BV043613888 
029 1 |a DEBSZ  |b 442828284 
035 |a (OCoLC)910911974  |z (OCoLC)897641309 
037 |a CL0500000525  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Talabis, Mark Ryan M.,  |e author. 
245 1 0 |a Information security analytics :  |b finding security insights, patterns, and anomalies in big data /  |c Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor. 
246 3 0 |a Finding security insights, patterns, and anomalies in big data 
264 1 |a Waltham, MA :  |b Syngress,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from title page (Safari, viewed January 5, 2015). 
505 0 |a Front Cover; Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data; Copyright; Dedication; Contents; Foreword; About the Authors; Acknowledgments; Chapter 1 -- Analytics Defined; INTRODUCTION TO SECURITY ANALYTICS; CONCEPTS AND TECHNIQUES IN ANALYTICS; DATA FOR SECURITY ANALYTICS; ANALYTICS IN EVERYDAY LIFE; SECURITY ANALYTICS PROCESS; REFERENCES; Chapter 2 -- Primer on Analytical Software and Tools; STATISTICAL PROGRAMMING; INTRODUCTION TO DATABASES AND BIG DATA TECHNIQUES; REFERENCES; Chapter 3 -- Analytics and Incident Response; INTRODUCTION. 
505 8 |a SCENARIOS AND CHALLENGES IN INTRUSIONS AND INCIDENT IDENTIFICATIONANALYSIS OF LOG FILES; LOADING THE DATA; ANOTHER POTENTIAL ANALYTICAL DATA SET: UNSTACKED STATUS CODES; OTHER APPLICABLE SECURITY AREAS AND SCENARIOS; SUMMARY; FURTHER READING; Chapter 4 -- Simulations and Security Processes; SIMULATION; CASE STUDY; Chapter 5 -- Access Analytics; INTRODUCTION; TECHNOLOGY PRIMER; SCENARIO, ANALYSIS, AND TECHNIQUES; CASE STUDY; ANALYZING THE RESULTS; Chapter 6 -- Security and Text Mining; SCENARIOS AND CHALLENGES IN SECURITY ANALYTICS WITH TEXT MINING. 
505 8 |a USE OF TEXT MINING TECHNIQUES TO ANALYZE AND FIND PATTERNS IN UNSTRUCTURED DATASTEP BY STEP TEXT MINING EXAMPLE IN R; OTHER APPLICABLE SECURITY AREAS AND SCENARIOS; Chapter 7 -- Security Intelligence and Next Steps; OVERVIEW; SECURITY INTELLIGENCE; SECURITY BREACHES; PRACTICAL APPLICATION; CONCLUDING REMARKS; Index. 
520 |a Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covere. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 0 |a Information resources management  |x Security measures. 
650 0 |a Big data  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Gestion de l'information  |x Sécurité  |x Mesures. 
650 6 |a Données volumineuses  |x Sécurité  |x Mesures. 
650 7 |a Computer security  |2 fast 
650 7 |a Information resources management  |x Security measures  |2 fast 
700 1 |a McPherson, Robert,  |e author. 
700 1 |a Miyamoto, I,  |e author. 
700 1 |a Martin, Jason L.,  |e author. 
776 0 8 |i Print version:  |a Talabis, Mark Ryan M.  |t Information Security Analytics : Finding Security Insights, Patterns, and Anomalies in Big Data.  |d Burlington : Elsevier Science, ©2014  |z 9780128002070 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1873129  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1873129 
994 |a 92  |b IZTAP