Description |
1 online resource |
Contents |
Introduction; Chapter 1: The Journey to Data-Driven Security; A Brief History of Learning from Data; Gathering Data Analysis Skills; Centering on a Question; Summary; Recommended Reading; Chapter 2: Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis; Why Python? Why R? And Why Both?; Jumpstarting Your Python Analytics with Canopy; Introducing Data Frames; Organizing Analyses; Summary; Recommended Reading; Chapter 3: Learning the Hello World of Security Data Analysis; Solving a Problem; Getting Data; Reading In Data; Exploring Data; Homing In on a Question |
|
Considerations in a Data Collection FrameworkAn Introduction to VERIS; Seeing VERIS in Action; Working with VCDB Data; Summary; Recommended Reading; Chapter 8: Breaking Up With Your Relational Database; Realizing the Container Has Constraints; Exploring Alternative Data Stores; Summary; Recommended Reading; Chapter 9: Demystifying Machine Learning; Detecting Malware; Benefiting from Machine Learning; Specific Learning Methods; Hands On: Clustering Breach Data; Summary; Recommended Reading; Chapter 10: Designing Effective Security Dashboards; What Is a Dashboard, Anyway? |
|
Chapter 11Chapter 12; R Packages Used |
Summary |
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma |
Bibliography |
Includes bibliographical references |
Notes |
Print version record |
Subject |
Computer security
|
|
Computer Security
|
|
COMPUTERS -- Security -- General.
|
|
Computer security
|
Form |
Electronic book
|
ISBN |
130637376X |
|
9781306373760 |
|
9781118793664 |
|
1118793668 |
|
9781118793824 |
|
111879382X |
|
1118793722 |
|
9781118793725 |
|