000 01661nam a2200241Ia 4500
003 NULRC
005 20250520100703.0
008 250520s9999 xx 000 0 und d
020 _a9781118793725
040 _cNULRC
050 _aQA 76.9.A25 .J33 2014
100 _aJacobs, Jay
_eauthor
245 0 _aData-driven security :
_banalysis, visualization and dashboards /
_cJay Jacobs and Bob Rudis
260 _aIndiana :
_bWiley,
_cc2014
300 _axix, 331 pages :
_billustrations ;
_c23 cm.
365 _bUSD484.04
504 _aIncludes bibliographical references and index.
505 _aChapter 1. The Journey to data-driven security -- Chapter 2. Building your analytics toolbox : a primer on using R and python for security analysis -- Chapter 3. learning the "hello world" of security data analysis -- Chapter 4. Performing exploratory security data analysis -- Chapter 5. From maps to regression -- Chapter 6. Visualizing security data -- chapter 7. Learning from security breaches -- Chapter 8 . Breaking up with your relational database -- Chapter 9. Demystifying machine learning -- Chapter 10. Designing effective security dashboards -- Chapter 11. Building interactive security visualizations -- Chapter 12. Moving toward data-driven security.
520 _aUncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data analysis and visualization.
650 _aCOMPUTER SECURITY
700 _aRudis, Bob
_eco-author
942 _2lcc
_cBK
999 _c11451
_d11451