Cargando…

Information security analytics : finding security insights, patterns, and anomalies in big data /

The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat sim...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Talabis, Mark Ryan M. (Autor), McPherson, Robert (Autor), Miyamoto, I (Autor), Martin, Jason L. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn896901266
003 OCoLC
005 20231017213018.0
006 m o d
007 cr mn|||||||||
008 141006t20152015maua ob 001 0 eng d
040 |a UKMGB  |b eng  |e rda  |e pn  |c UKMGB  |d OCLCO  |d N$T  |d YDXCP  |d UIU  |d N$T  |d UMI  |d TEFOD  |d COO  |d WAU  |d DEBBG  |d B24X7  |d STF  |d DEBSZ  |d TEFOD  |d OCLCQ  |d OSU  |d OCLCQ  |d VGM  |d LIV  |d OCLCA  |d BUF  |d OCLCF  |d U3W  |d D6H  |d INT  |d OCLCQ  |d DCT  |d ERF  |d OCLCA  |d BRF  |d MM9  |d OCLCO  |d OCLCQ  |d TOH  |d OCLCQ  |d INARC  |d OCLCO 
016 7 |a 016947801  |2 Uk 
016 7 |a 016945760  |2 Uk 
019 |a 899607334  |a 963737788  |a 966848495  |a 1166552045  |a 1173671127  |a 1180935120  |a 1391555034 
020 |a 9780128005064  |q (electronic bk.) 
020 |a 0128005068  |q (electronic bk.) 
020 |z 9780128002070  |q (pbk.) 
020 |z 0128002077  |q (pbk.) 
029 1 |a AU@  |b 000054998740 
029 1 |a CHNEW  |b 001026538 
029 1 |a DEBBG  |b BV042490567 
029 1 |a DEBSZ  |b 434138134 
029 1 |a DEBSZ  |b 434837466 
029 1 |a GBVCP  |b 882843524 
035 |a (OCoLC)896901266  |z (OCoLC)899607334  |z (OCoLC)963737788  |z (OCoLC)966848495  |z (OCoLC)1166552045  |z (OCoLC)1173671127  |z (OCoLC)1180935120  |z (OCoLC)1391555034 
037 |a CL0500000525  |b Safari Books Online 
037 |a F5A4F859-DEFE-4DC9-AD2C-D30043616D68  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b T3358 2015 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Talabis, Mark Ryan M.,  |e author. 
245 1 0 |a Information security analytics :  |b finding security insights, patterns, and anomalies in big data /  |c Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor. 
264 1 |a Waltham, MA :  |b Syngress,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (xv, 166 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --  |c Edited summary from book. 
504 |a Includes bibliographical references and index. 
505 0 |a Analytics Defined -- Primer on Analytical Software and Tools -- Analytics and Incident Response -- Simulations and Security Processes -- Access Analytics -- Security and Text Mining -- Security Intelligence and Next Steps. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Information resources management  |x Security measures. 
650 0 |a Big data  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Gestion de l'information  |x Sécurité  |x Mesures. 
650 6 |a Données volumineuses  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Information resources management  |x Security measures  |2 fast 
700 1 |a McPherson, Robert,  |e author. 
700 1 |a Miyamoto, I,  |e author. 
700 1 |a Martin, Jason L.,  |e author. 
776 0 8 |i Print version:  |a Talabis, Mark Ryan M.  |t Information Security Analytics.  |d Waltham, MA : Syngress, [2015]  |z 9780128002070  |w (OCoLC)903214048 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128002070/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00077762 
938 |a EBSCOhost  |b EBSC  |n 916371 
938 |a YBP Library Services  |b YANK  |n 12182131 
938 |a Internet Archive  |b INAR  |n informationsecur0000tala 
994 |a 92  |b IZTAP