Information security analytics: finding security insights, patterns, and anomalies in big data
The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat sim...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
[2015]
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. -- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xv, 166 pages) illustrations |
ISBN: | 9780128005064 0128005068 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126713 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2015 |||| o||u| ||||||eng d | ||
020 | |a 9780128005064 |9 978-0-12-800506-4 | ||
020 | |a 0128005068 |9 0-12-800506-8 | ||
035 | |a (ZDB-33-ESD)ocn896901266 | ||
035 | |a (OCoLC)896901266 | ||
035 | |a (DE-599)BVBBV046126713 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Talabis, Mark |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security analytics |b finding security insights, patterns, and anomalies in big data |c Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor |
264 | 1 | |a Waltham, MA |b Syngress |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (xv, 166 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. -- | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information resources management / Security measures |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information resources management |x Security measures | |
650 | 4 | |a Big data |x Security measures | |
650 | 0 | 7 | |a Big Data |0 (DE-588)4802620-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Big Data |0 (DE-588)4802620-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a McPherson, Robert |4 aut | |
700 | 1 | |a Miyamoto, I |4 aut | |
700 | 1 | |a Martin, Jason L. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0128002077 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128002070 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128002070 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031507167 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128002070 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180447095160832 |
---|---|
any_adam_object | |
author | Talabis, Mark McPherson, Robert Miyamoto, I Martin, Jason L. |
author_facet | Talabis, Mark McPherson, Robert Miyamoto, I Martin, Jason L. |
author_role | aut aut aut aut |
author_sort | Talabis, Mark |
author_variant | m t mt r m rm i m im j l m jl jlm |
building | Verbundindex |
bvnumber | BV046126713 |
classification_rvk | ST 277 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn896901266 (OCoLC)896901266 (DE-599)BVBBV046126713 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02988nmm a2200589zc 4500</leader><controlfield tag="001">BV046126713</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128005064</subfield><subfield code="9">978-0-12-800506-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128005068</subfield><subfield code="9">0-12-800506-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn896901266</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)896901266</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126713</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Talabis, Mark</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security analytics</subfield><subfield code="b">finding security insights, patterns, and anomalies in big data</subfield><subfield code="c">Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 166 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information resources management / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McPherson, Robert</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miyamoto, I</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martin, Jason L.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0128002077</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128002070</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128002070</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507167</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128002070</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046126713 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:54Z |
institution | BVB |
isbn | 9780128005064 0128005068 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507167 |
oclc_num | 896901266 |
open_access_boolean | |
physical | 1 online resource (xv, 166 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress |
record_format | marc |
spelling | Talabis, Mark Verfasser aut Information security analytics finding security insights, patterns, and anomalies in big data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor Waltham, MA Syngress [2015] © 2015 1 online resource (xv, 166 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. -- COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Information resources management / Security measures fast Computer security Information resources management Security measures Big data Security measures Big Data (DE-588)4802620-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Big Data (DE-588)4802620-7 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 McPherson, Robert aut Miyamoto, I aut Martin, Jason L. aut Erscheint auch als Druck-Ausgabe 0128002077 Erscheint auch als Druck-Ausgabe 9780128002070 http://www.sciencedirect.com/science/book/9780128002070 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Talabis, Mark McPherson, Robert Miyamoto, I Martin, Jason L. Information security analytics finding security insights, patterns, and anomalies in big data COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Information resources management / Security measures fast Computer security Information resources management Security measures Big data Security measures Big Data (DE-588)4802620-7 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4802620-7 (DE-588)4011144-1 |
title | Information security analytics finding security insights, patterns, and anomalies in big data |
title_auth | Information security analytics finding security insights, patterns, and anomalies in big data |
title_exact_search | Information security analytics finding security insights, patterns, and anomalies in big data |
title_full | Information security analytics finding security insights, patterns, and anomalies in big data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor |
title_fullStr | Information security analytics finding security insights, patterns, and anomalies in big data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor |
title_full_unstemmed | Information security analytics finding security insights, patterns, and anomalies in big data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor |
title_short | Information security analytics |
title_sort | information security analytics finding security insights patterns and anomalies in big data |
title_sub | finding security insights, patterns, and anomalies in big data |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Information resources management / Security measures fast Computer security Information resources management Security measures Big data Security measures Big Data (DE-588)4802620-7 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Information resources management / Security measures Information resources management Security measures Big data Security measures Big Data Datensicherung |
url | http://www.sciencedirect.com/science/book/9780128002070 |
work_keys_str_mv | AT talabismark informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata AT mcphersonrobert informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata AT miyamotoi informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata AT martinjasonl informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata |