TY - BOOK AU - Talabis,Mark AU - Martin,Jason AU - McPherson,Robert AU - Miyamoto,Inez TI - Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data SN - 9780128005064 AV - QA76.9.A25 -- .I546 2015eb U1 - 005.8 PY - 2014/// CY - San Diego PB - Elsevier Science & Technology Books KW - Big data -- Security measures KW - Electronic books N1 - Front Cover -- Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data -- Copyright -- Dedication -- Contents -- Foreword -- About the Authors -- Acknowledgments -- Chapter 1 - Analytics Defined -- INTRODUCTION TO SECURITY ANALYTICS -- CONCEPTS AND TECHNIQUES IN ANALYTICS -- DATA FOR SECURITY ANALYTICS -- ANALYTICS IN EVERYDAY LIFE -- SECURITY ANALYTICS PROCESS -- REFERENCES -- Chapter 2 - Primer on Analytical Software and Tools -- STATISTICAL PROGRAMMING -- INTRODUCTION TO DATABASES AND BIG DATA TECHNIQUES -- REFERENCES -- Chapter 3 - Analytics and Incident Response -- INTRODUCTION -- SCENARIOS AND CHALLENGES IN INTRUSIONS AND INCIDENT IDENTIFICATION -- ANALYSIS OF LOG FILES -- LOADING THE DATA -- ANOTHER POTENTIAL ANALYTICAL DATA SET: UNSTACKED STATUS CODES -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- SUMMARY -- FURTHER READING -- Chapter 4 - Simulations and Security Processes -- SIMULATION -- CASE STUDY -- Chapter 5 - Access Analytics -- INTRODUCTION -- TECHNOLOGY PRIMER -- SCENARIO, ANALYSIS, AND TECHNIQUES -- CASE STUDY -- ANALYZING THE RESULTS -- Chapter 6 - Security and Text Mining -- SCENARIOS AND CHALLENGES IN SECURITY ANALYTICS WITH TEXT MINING -- USE OF TEXT MINING TECHNIQUES TO ANALYZE AND FIND PATTERNS IN UNSTRUCTURED DATA -- STEP BY STEP TEXT MINING EXAMPLE IN R -- OTHER APPLICABLE SECURITY AREAS AND SCENARIOS -- Chapter 7 - Security Intelligence and Next Steps -- OVERVIEW -- SECURITY INTELLIGENCE -- SECURITY BREACHES -- PRACTICAL APPLICATION -- CONCLUDING REMARKS -- Index UR - https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1873129 ER -