Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saint Louis
Elsevier Science
2014
|
Schlagworte: | |
Zusammenfassung: | Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. Written by security practitioners, for security practitionersReal-world case studies and scenarios are provided for each analytics techniqueLearn about open-source analytics and statistical packages, tools, and applicationsStep-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios providedLearn how to design and utilize simulations for "what-if" scenarios to simulate security events and processesLearn how to utilize big data techniques to assist in incident response and intrusion analysis |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (183 pages) |
ISBN: | 9780128005064 9780128002070 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043613888 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128005064 |9 978-0-12-800506-4 | ||
020 | |a 9780128002070 |c Print |9 978-0-12-800207-0 | ||
035 | |a (ZDB-30-PQE)EBC1873129 | ||
035 | |a (ZDB-89-EBL)EBL1873129 | ||
035 | |a (ZDB-38-EBR)ebr10992061 | ||
035 | |a (OCoLC)910911974 | ||
035 | |a (DE-599)BVBBV043613888 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Talabis, Mark |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information Security Analytics |b Finding Security Insights, Patterns, and Anomalies in Big Data |
264 | 1 | |a Saint Louis |b Elsevier Science |c 2014 | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (183 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. Written by security practitioners, for security practitionersReal-world case studies and scenarios are provided for each analytics techniqueLearn about open-source analytics and statistical packages, tools, and applicationsStep-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios providedLearn how to design and utilize simulations for "what-if" scenarios to simulate security events and processesLearn how to utilize big data techniques to assist in incident response and intrusion analysis | ||
650 | 4 | |a Big data -- Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information resources management -- Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Big Data |0 (DE-588)4802620-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Big Data |0 (DE-588)4802620-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Miyamoto, I. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Talabis, Mark |t Information Security Analytics : Finding Security Insights, Patterns, and Anomalies in Big Data |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029027947 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176357371936768 |
---|---|
any_adam_object | |
author | Talabis, Mark |
author_facet | Talabis, Mark |
author_role | aut |
author_sort | Talabis, Mark |
author_variant | m t mt |
building | Verbundindex |
bvnumber | BV043613888 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1873129 (ZDB-89-EBL)EBL1873129 (ZDB-38-EBR)ebr10992061 (OCoLC)910911974 (DE-599)BVBBV043613888 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03646nmm a2200481zc 4500</leader><controlfield tag="001">BV043613888</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128005064</subfield><subfield code="9">978-0-12-800506-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128002070</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-800207-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1873129</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1873129</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10992061</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)910911974</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043613888</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Talabis, Mark</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Security Analytics</subfield><subfield code="b">Finding Security Insights, Patterns, and Anomalies in Big Data</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saint Louis</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (183 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. Written by security practitioners, for security practitionersReal-world case studies and scenarios are provided for each analytics techniqueLearn about open-source analytics and statistical packages, tools, and applicationsStep-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios providedLearn how to design and utilize simulations for "what-if" scenarios to simulate security events and processesLearn how to utilize big data techniques to assist in incident response and intrusion analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management -- Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miyamoto, I.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Talabis, Mark</subfield><subfield code="t">Information Security Analytics : Finding Security Insights, Patterns, and Anomalies in Big Data</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029027947</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV043613888 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:54Z |
institution | BVB |
isbn | 9780128005064 9780128002070 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029027947 |
oclc_num | 910911974 |
open_access_boolean | |
physical | 1 online resource (183 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Talabis, Mark Verfasser aut Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data Saint Louis Elsevier Science 2014 © 2015 1 online resource (183 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. Written by security practitioners, for security practitionersReal-world case studies and scenarios are provided for each analytics techniqueLearn about open-source analytics and statistical packages, tools, and applicationsStep-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios providedLearn how to design and utilize simulations for "what-if" scenarios to simulate security events and processesLearn how to utilize big data techniques to assist in incident response and intrusion analysis Big data -- Security measures Computer security Information resources management -- Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Big Data (DE-588)4802620-7 gnd rswk-swf Big Data (DE-588)4802620-7 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Miyamoto, I. Sonstige oth Erscheint auch als Druck-Ausgabe Talabis, Mark Information Security Analytics : Finding Security Insights, Patterns, and Anomalies in Big Data 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Talabis, Mark Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data Big data -- Security measures Computer security Information resources management -- Security measures Datensicherung (DE-588)4011144-1 gnd Big Data (DE-588)4802620-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4802620-7 |
title | Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data |
title_auth | Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data |
title_exact_search | Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data |
title_full | Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data |
title_fullStr | Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data |
title_full_unstemmed | Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data |
title_short | Information Security Analytics |
title_sort | information security analytics finding security insights patterns and anomalies in big data |
title_sub | Finding Security Insights, Patterns, and Anomalies in Big Data |
topic | Big data -- Security measures Computer security Information resources management -- Security measures Datensicherung (DE-588)4011144-1 gnd Big Data (DE-588)4802620-7 gnd |
topic_facet | Big data -- Security measures Computer security Information resources management -- Security measures Datensicherung Big Data |
work_keys_str_mv | AT talabismark informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata AT miyamotoi informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata |