Benutzerdefiniertes Cover
Benutzerdefiniertes Cover
Normale Ansicht MARC-Ansicht ISBD

Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis

Von: Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Verlag: New York : John Wiley & Sons, Incorporated, 2014Auflage: Online-AusgBeschreibung: Online-Ressource (1 online resource (xix, 331 p.)) : illISBN:
  • 9781118793824
  • 9781306373760
  • 130637376X
  • 9781118793664
Schlagwörter: Andere physische Formen: 9781118793725 | 1306373751 | Druckausg.: 9781118793725 | Druckausg.:: Druckausg. | Erscheint auch als: Data-driven security. Druck-Ausgabe Indianapolis, Indiana : John Wiley & Sons, 2014. XIX, 331 S.DDC-Klassifikation:
  • 005.8
RVK: RVK: ST 277LOC-Klassifikation:
  • HF5548.37
Online-Ressourcen: Zusammenfassung: Cover -- Title Page -- Copyright -- Contents -- Introduction -- Overview of the Book and Technologies -- How This Book Is Organized -- Who Should Read This Book -- Tools You Will Need -- What's on the Website -- The Journey Begins! -- Chapter 1 The Journey to Data-Driven Security -- A Brief History of Learning from Data -- Nineteenth Century Data Analysis -- Twentieth Century Data Analysis -- Twenty-First Century Data Analysis -- Gathering Data Analysis Skills -- Domain Expertise -- Programming Skills -- Data Management -- Statistics -- Visualization (a.k.a. Communication) -- Combining the Skills -- Centering on a Question -- Creating a Good Research Question -- Exploratory Data Analysis -- Summary -- Recommended Reading -- Chapter 2 Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis -- Why Python? Why R? And Why Both? -- Why Python? -- Why R? -- Why Both? -- Jumpstarting Your Python Analytics with Canopy -- Understanding the Python Data Analysis and Visualization Ecosystem -- Setting Up Your R Environment -- Introducing Data Frames -- Organizing Analyses -- Summary -- Recommended Reading -- Chapter 3 Learning the "Hello World" of Security Data Analysis -- Solving a Problem -- Getting Data -- Reading In Data -- Exploring Data -- Homing In on a Question -- Summary -- Recommended Reading -- Chapter 4 Performing Exploratory Security Data Analysis -- Dissecting the IP Address -- Representing IP Addresses -- Segmenting and Grouping IP Addresses -- Locating IP Addresses -- Augmenting IP Address Data -- Association/Correlation, Causation, and Security Operations Center Analysts Gone Rogue -- Mapping Outside the Continents -- Visualizing the ZeuS Botnet -- Visualizing Your Firewall Data -- Summary -- Recommended Reading -- Chapter 5 From Maps to Regression -- Simplifying Maps.PPN: PPN: 787518328Package identifier: Produktsigel: ZDB-26-MYL | ZDB-30-PAD | ZDB-30-PQE
Dieser Titel hat keine Exemplare