Data-Driven Security: Analysis, Visualization and Dashboards
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Somerset
Wiley
2014
|
Ausgabe: | 1st ed |
Schlagworte: | |
Zusammenfassung: | Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (354 pages) |
ISBN: | 9781118793664 9781118793725 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043607185 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118793664 |9 978-1-118-79366-4 | ||
020 | |a 9781118793725 |c Print |9 978-1-118-79372-5 | ||
035 | |a (ZDB-30-PQE)EBC1599321 | ||
035 | |a (ZDB-89-EBL)EBL1599321 | ||
035 | |a (ZDB-38-EBR)ebr10829790 | ||
035 | |a (OCoLC)868963701 | ||
035 | |a (DE-599)BVBBV043607185 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Jacobs, Jay |e Verfasser |4 aut | |
245 | 1 | 0 | |a Data-Driven Security |b Analysis, Visualization and Dashboards |
250 | |a 1st ed | ||
264 | 1 | |a Somerset |b Wiley |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (354 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards | ||
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Rudis, Bob |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Jacobs, Jay |t Data-Driven Security : Analysis, Visualization and Dashboards |
912 | |a ZDB-30-PQE |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029021244 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176354082553856 |
---|---|
any_adam_object | |
author | Jacobs, Jay |
author_facet | Jacobs, Jay |
author_role | aut |
author_sort | Jacobs, Jay |
author_variant | j j jj |
building | Verbundindex |
bvnumber | BV043607185 |
collection | ZDB-30-PQE ZDB-38-ESG |
ctrlnum | (ZDB-30-PQE)EBC1599321 (ZDB-89-EBL)EBL1599321 (ZDB-38-EBR)ebr10829790 (OCoLC)868963701 (DE-599)BVBBV043607185 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03070nmm a2200445zc 4500</leader><controlfield tag="001">BV043607185</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118793664</subfield><subfield code="9">978-1-118-79366-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118793725</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-118-79372-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1599321</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1599321</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10829790</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)868963701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043607185</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jacobs, Jay</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data-Driven Security</subfield><subfield code="b">Analysis, Visualization and Dashboards</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Somerset</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (354 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rudis, Bob</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Jacobs, Jay</subfield><subfield code="t">Data-Driven Security : Analysis, Visualization and Dashboards</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029021244</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV043607185 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:51Z |
institution | BVB |
isbn | 9781118793664 9781118793725 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029021244 |
oclc_num | 868963701 |
open_access_boolean | |
physical | 1 online resource (354 pages) |
psigel | ZDB-30-PQE ZDB-38-ESG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Jacobs, Jay Verfasser aut Data-Driven Security Analysis, Visualization and Dashboards 1st ed Somerset Wiley 2014 © 2014 1 online resource (354 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Rudis, Bob Sonstige oth Erscheint auch als Druck-Ausgabe Jacobs, Jay Data-Driven Security : Analysis, Visualization and Dashboards 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Jacobs, Jay Data-Driven Security Analysis, Visualization and Dashboards Computer security Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Data-Driven Security Analysis, Visualization and Dashboards |
title_auth | Data-Driven Security Analysis, Visualization and Dashboards |
title_exact_search | Data-Driven Security Analysis, Visualization and Dashboards |
title_full | Data-Driven Security Analysis, Visualization and Dashboards |
title_fullStr | Data-Driven Security Analysis, Visualization and Dashboards |
title_full_unstemmed | Data-Driven Security Analysis, Visualization and Dashboards |
title_short | Data-Driven Security |
title_sort | data driven security analysis visualization and dashboards |
title_sub | Analysis, Visualization and Dashboards |
topic | Computer security Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security Computersicherheit |
work_keys_str_mv | AT jacobsjay datadrivensecurityanalysisvisualizationanddashboards AT rudisbob datadrivensecurityanalysisvisualizationanddashboards |