ORPP logo
Image from Google Jackets

Information Security Analytics : Finding Security Insights, Patterns, and Anomalies in Big Data.

By: Contributor(s): Material type: TextTextPublisher: San Diego : Elsevier Science & Technology Books, 2014Copyright date: ©2015Edition: 1st edDescription: 1 online resource (183 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780128005064
Subject(s): Genre/Form: Additional physical formats: Print version:: Information Security AnalyticsDDC classification:
  • 005.8
LOC classification:
  • QA76.9.A25 -- .I546 2015eb
Online resources:
Contents:
Front Cover -- Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data -- Copyright -- Dedication -- Contents -- Foreword -- About the Authors -- Acknowledgments -- Chapter 1 - Analytics Defined -- INTRODUCTION TO SECURITY ANALYTICS -- CONCEPTS AND TECHNIQUES IN ANALYTICS -- DATA FOR SECURITY ANALYTICS -- ANALYTICS IN EVERYDAY LIFE -- SECURITY ANALYTICS PROCESS -- REFERENCES -- Chapter 2 - Primer on Analytical Software and Tools -- STATISTICAL PROGRAMMING -- INTRODUCTION TO DATABASES AND BIG DATA TECHNIQUES -- REFERENCES -- Chapter 3 - Analytics and Incident Response -- INTRODUCTION -- SCENARIOS AND CHALLENGES IN INTRUSIONS AND INCIDENT IDENTIFICATION -- ANALYSIS OF LOG FILES -- LOADING THE DATA -- ANOTHER POTENTIAL ANALYTICAL DATA SET: UNSTACKED STATUS CODES -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- SUMMARY -- FURTHER READING -- Chapter 4 - Simulations and Security Processes -- SIMULATION -- CASE STUDY -- Chapter 5 - Access Analytics -- INTRODUCTION -- TECHNOLOGY PRIMER -- SCENARIO, ANALYSIS, AND TECHNIQUES -- CASE STUDY -- ANALYZING THE RESULTS -- Chapter 6 - Security and Text Mining -- SCENARIOS AND CHALLENGES IN SECURITY ANALYTICS WITH TEXT MINING -- USE OF TEXT MINING TECHNIQUES TO ANALYZE AND FIND PATTERNS IN UNSTRUCTURED DATA -- STEP BY STEP TEXT MINING EXAMPLE IN R -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- Chapter 7 - Security Intelligence and Next Steps -- OVERVIEW -- SECURITY INTELLIGENCE -- SECURITY BREACHES -- PRACTICAL APPLICATION -- CONCLUDING REMARKS -- Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Front Cover -- Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data -- Copyright -- Dedication -- Contents -- Foreword -- About the Authors -- Acknowledgments -- Chapter 1 - Analytics Defined -- INTRODUCTION TO SECURITY ANALYTICS -- CONCEPTS AND TECHNIQUES IN ANALYTICS -- DATA FOR SECURITY ANALYTICS -- ANALYTICS IN EVERYDAY LIFE -- SECURITY ANALYTICS PROCESS -- REFERENCES -- Chapter 2 - Primer on Analytical Software and Tools -- STATISTICAL PROGRAMMING -- INTRODUCTION TO DATABASES AND BIG DATA TECHNIQUES -- REFERENCES -- Chapter 3 - Analytics and Incident Response -- INTRODUCTION -- SCENARIOS AND CHALLENGES IN INTRUSIONS AND INCIDENT IDENTIFICATION -- ANALYSIS OF LOG FILES -- LOADING THE DATA -- ANOTHER POTENTIAL ANALYTICAL DATA SET: UNSTACKED STATUS CODES -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- SUMMARY -- FURTHER READING -- Chapter 4 - Simulations and Security Processes -- SIMULATION -- CASE STUDY -- Chapter 5 - Access Analytics -- INTRODUCTION -- TECHNOLOGY PRIMER -- SCENARIO, ANALYSIS, AND TECHNIQUES -- CASE STUDY -- ANALYZING THE RESULTS -- Chapter 6 - Security and Text Mining -- SCENARIOS AND CHALLENGES IN SECURITY ANALYTICS WITH TEXT MINING -- USE OF TEXT MINING TECHNIQUES TO ANALYZE AND FIND PATTERNS IN UNSTRUCTURED DATA -- STEP BY STEP TEXT MINING EXAMPLE IN R -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- Chapter 7 - Security Intelligence and Next Steps -- OVERVIEW -- SECURITY INTELLIGENCE -- SECURITY BREACHES -- PRACTICAL APPLICATION -- CONCLUDING REMARKS -- Index.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.