Information Security Analytics : Finding Security Insights, Patterns, and Anomalies in Big Data.
Material type:
- text
- computer
- online resource
- 9780128005064
- 005.8
- QA76.9.A25 -- .I546 2015eb
Front Cover -- Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data -- Copyright -- Dedication -- Contents -- Foreword -- About the Authors -- Acknowledgments -- Chapter 1 - Analytics Defined -- INTRODUCTION TO SECURITY ANALYTICS -- CONCEPTS AND TECHNIQUES IN ANALYTICS -- DATA FOR SECURITY ANALYTICS -- ANALYTICS IN EVERYDAY LIFE -- SECURITY ANALYTICS PROCESS -- REFERENCES -- Chapter 2 - Primer on Analytical Software and Tools -- STATISTICAL PROGRAMMING -- INTRODUCTION TO DATABASES AND BIG DATA TECHNIQUES -- REFERENCES -- Chapter 3 - Analytics and Incident Response -- INTRODUCTION -- SCENARIOS AND CHALLENGES IN INTRUSIONS AND INCIDENT IDENTIFICATION -- ANALYSIS OF LOG FILES -- LOADING THE DATA -- ANOTHER POTENTIAL ANALYTICAL DATA SET: UNSTACKED STATUS CODES -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- SUMMARY -- FURTHER READING -- Chapter 4 - Simulations and Security Processes -- SIMULATION -- CASE STUDY -- Chapter 5 - Access Analytics -- INTRODUCTION -- TECHNOLOGY PRIMER -- SCENARIO, ANALYSIS, AND TECHNIQUES -- CASE STUDY -- ANALYZING THE RESULTS -- Chapter 6 - Security and Text Mining -- SCENARIOS AND CHALLENGES IN SECURITY ANALYTICS WITH TEXT MINING -- USE OF TEXT MINING TECHNIQUES TO ANALYZE AND FIND PATTERNS IN UNSTRUCTURED DATA -- STEP BY STEP TEXT MINING EXAMPLE IN R -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- Chapter 7 - Security Intelligence and Next Steps -- OVERVIEW -- SECURITY INTELLIGENCE -- SECURITY BREACHES -- PRACTICAL APPLICATION -- CONCLUDING REMARKS -- Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.