Talabis, Mark.

Information Security Analytics : Finding Security Insights, Patterns, and Anomalies in Big Data. - 1st ed. - 1 online resource (183 pages)

Front Cover -- Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data -- Copyright -- Dedication -- Contents -- Foreword -- About the Authors -- Acknowledgments -- Chapter 1 - Analytics Defined -- INTRODUCTION TO SECURITY ANALYTICS -- CONCEPTS AND TECHNIQUES IN ANALYTICS -- DATA FOR SECURITY ANALYTICS -- ANALYTICS IN EVERYDAY LIFE -- SECURITY ANALYTICS PROCESS -- REFERENCES -- Chapter 2 - Primer on Analytical Software and Tools -- STATISTICAL PROGRAMMING -- INTRODUCTION TO DATABASES AND BIG DATA TECHNIQUES -- REFERENCES -- Chapter 3 - Analytics and Incident Response -- INTRODUCTION -- SCENARIOS AND CHALLENGES IN INTRUSIONS AND INCIDENT IDENTIFICATION -- ANALYSIS OF LOG FILES -- LOADING THE DATA -- ANOTHER POTENTIAL ANALYTICAL DATA SET: UNSTACKED STATUS CODES -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- SUMMARY -- FURTHER READING -- Chapter 4 - Simulations and Security Processes -- SIMULATION -- CASE STUDY -- Chapter 5 - Access Analytics -- INTRODUCTION -- TECHNOLOGY PRIMER -- SCENARIO, ANALYSIS, AND TECHNIQUES -- CASE STUDY -- ANALYZING THE RESULTS -- Chapter 6 - Security and Text Mining -- SCENARIOS AND CHALLENGES IN SECURITY ANALYTICS WITH TEXT MINING -- USE OF TEXT MINING TECHNIQUES TO ANALYZE AND FIND PATTERNS IN UNSTRUCTURED DATA -- STEP BY STEP TEXT MINING EXAMPLE IN R -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- Chapter 7 - Security Intelligence and Next Steps -- OVERVIEW -- SECURITY INTELLIGENCE -- SECURITY BREACHES -- PRACTICAL APPLICATION -- CONCLUDING REMARKS -- Index.

9780128005064


Big data -- Security measures.


Electronic books.

QA76.9.A25 -- .I546 2015eb

005.8