ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Database Management / Database Mining

Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

| £49.95 | €56.18 | Ca$81.04 | Au$79.98
by Mark Talabis & Robert McPherson & I. Miyamoto
What is this?DRM-EPUB by download  |  $59.95
What is this?DRM-PDF by download  |  $59.95
add to wish list
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data by Mark Talabis & Robert McPherson & I. Miyamoto

Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.

Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.

The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.

  • Written by security practitioners, for security practitioners
  • Real-world case studies and scenarios are provided for each analytics technique
  • Learn about open-source analytics and statistical packages, tools, and applications
  • Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided
  • Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes
  • Learn how to utilize big data techniques to assist in incident response and intrusion analysis

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 654108

Ebook Details
Pages: 182
Size: 8.5 MB
Publisher: Syngress
Date published:   2014
ISBN: 2370006338475 (DRM-EPUB)
9780128005064 (DRM-PDF)

DRM Settings
Read Aloud:  not allowed

This product is listed in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Database Management > Database Mining

These authors have products in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Information Technology
Nonfiction > Social Science
Nonfiction > Social Science > Ethnic Studies > Native American Studies
Nonfiction > History
Nonfiction > History > Native American
Nonfiction > History > United States > State & Local > Southwest
Nonfiction > Computers > Database Management > Database Mining

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016