skip to content
Data-Driven Security : Analysis, Visualization and Dashboards. Preview this item
ClosePreview this item
Checking...

Data-Driven Security : Analysis, Visualization and Dashboards.

Author: Jay Jacobs
Publisher: Wiley, 2014.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Jay Jacobs
ISBN: 130637376X 9781306373760 9781118793664 1118793668 9781118793824 111879382X
OCLC Number: 868963701
Description: 1 online resource
Contents: Introduction; Chapter 1: The Journey to Data-Driven Security; A Brief History of Learning from Data; Gathering Data Analysis Skills; Centering on a Question; Summary; Recommended Reading; Chapter 2: Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis; Why Python? Why R? And Why Both?; Jumpstarting Your Python Analytics with Canopy; Introducing Data Frames; Organizing Analyses; Summary; Recommended Reading; Chapter 3: Learning the Hello World of Security Data Analysis; Solving a Problem; Getting Data; Reading In Data; Exploring Data; Homing In on a Question. Considerations in a Data Collection FrameworkAn Introduction to VERIS; Seeing VERIS in Action; Working with VCDB Data; Summary; Recommended Reading; Chapter 8: Breaking Up With Your Relational Database; Realizing the Container Has Constraints; Exploring Alternative Data Stores; Summary; Recommended Reading; Chapter 9: Demystifying Machine Learning; Detecting Malware; Benefiting from Machine Learning; Specific Learning Methods; Hands On: Clustering Breach Data; Summary; Recommended Reading; Chapter 10: Designing Effective Security Dashboards; What Is a Dashboard, Anyway? Chapter 11Chapter 12; R Packages Used.

Abstract:

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/868963701> # Data-Driven Security : Analysis, Visualization and Dashboards.
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "868963701" ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/0128-1/{F3B983D7-0726-4F76-B193-6EC182E66948}Img100.jpg'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1872008128#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://dewey.info/class/005.8/> ;
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:bookFormat schema:EBook ;
    schema:creator <http://viaf.org/viaf/70977358> ; # Jay Jacobs
    schema:datePublished "2014" ;
    schema:description "Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma."@en ;
    schema:description "Introduction; Chapter 1: The Journey to Data-Driven Security; A Brief History of Learning from Data; Gathering Data Analysis Skills; Centering on a Question; Summary; Recommended Reading; Chapter 2: Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis; Why Python? Why R? And Why Both?; Jumpstarting Your Python Analytics with Canopy; Introducing Data Frames; Organizing Analyses; Summary; Recommended Reading; Chapter 3: Learning the Hello World of Security Data Analysis; Solving a Problem; Getting Data; Reading In Data; Exploring Data; Homing In on a Question."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1872008128> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/1872008128#CreativeWork/> ;
    schema:name "Data-Driven Security : Analysis, Visualization and Dashboards."@en ;
    schema:productID "868963701" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/868963701#PublicationEvent/wiley_2014> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1872008128#Agent/wiley> ; # Wiley
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=688378> ;
    schema:url <http://proquest.tech.safaribooksonline.de/9781118793824> ;
    schema:url <http://site.ebrary.com/id/10829790> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=4038744> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=62619> ;
    schema:url <https://samples.overdrive.com/data-driven-security?.epub-sample.overdrive.com> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1599321> ;
    schema:url <http://www.myilibrary.com?id=568627> ;
    schema:url "http://images.contentreserve.com/ImageType-100/0128-1/{F3B983D7-0726-4F76-B193-6EC182E66948}Img100.jpg" ;
    schema:url <http://proquest.safaribooksonline.com/9781118793824> ;
    schema:url <http://swbplus.bsz-bw.de/bsz405574274cov.htm> ;
    schema:url <http://swbplus.bsz-bw.de/bsz41417612xcov.htm> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=688378> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=1599321> ;
    schema:url <https://www.overdrive.com/search?q=F3B983D7-0726-4F76-B193-6EC182E66948> ;
    schema:workExample <http://worldcat.org/isbn/9781118793824> ;
    schema:workExample <http://worldcat.org/isbn/9781306373760> ;
    schema:workExample <http://worldcat.org/isbn/9781118793664> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/868963701> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1872008128#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/70977358> # Jay Jacobs
    a schema:Person ;
    schema:familyName "Jacobs" ;
    schema:givenName "Jay" ;
    schema:name "Jay Jacobs" ;
    .

<http://worldcat.org/entity/work/data/1872008128#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/868963701> ; # Data-Driven Security : Analysis, Visualization and Dashboards.
    .

<http://worldcat.org/isbn/9781118793664>
    a schema:ProductModel ;
    schema:isbn "1118793668" ;
    schema:isbn "9781118793664" ;
    .

<http://worldcat.org/isbn/9781118793824>
    a schema:ProductModel ;
    schema:isbn "111879382X" ;
    schema:isbn "9781118793824" ;
    .

<http://worldcat.org/isbn/9781306373760>
    a schema:ProductModel ;
    schema:isbn "130637376X" ;
    schema:isbn "9781306373760" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.