Get Free Shipping on orders over $79
Information Security Analytics : Finding Security Insights, Patterns and Anomalies in Big Data - Mark Talabis

Information Security Analytics

Finding Security Insights, Patterns and Anomalies in Big Data

By: Mark Talabis, Robert McPherson, I Miyamoto, Jason Martin

Paperback | 26 November 2014 | Edition Number 1

At a Glance

Paperback


RRP $93.95

$87.75

or 4 interest-free payments of $21.94 with

 or 

Ships in 5 to 7 business days

Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.

Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.

The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.

  • Written by security practitioners, for security practitioners
  • Real-world case studies and scenarios are provided for each analytics technique
  • Learn about open-source analytics and statistical packages, tools, and applications
  • Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided
  • Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes
  • Learn how to utilize big data techniques to assist in incident response and intrusion analysis
Industry Reviews
"...a good how-to guide with plenty of coding examples, to show the reader how to effectively use the tools to make sense of the data they have....the gold-standard on the topic." --RSAConference.com

More in Technology in General

Breakneck : China's Quest to Engineer the Future - Dan Wang

RRP $55.00

$42.75

22%
OFF
First Knowledges Innovation : Knowledge and Ingenuity - Ian J McNiven
Thing Explainer : Complicated Stuff in Simple Words - Randall Munroe
Epic Disruptions : 11 Innovations That Shaped Our Modern World - Scott D. Anthony
The C Programming Language : Prentice Hall Software - Brian Kernighan

RRP $107.04

$73.75

31%
OFF
Gilded Rage : Elon Musk and the Radicalization of Silicon Valley - Jacob Silverman
Exactly : How Precision Engineers Created the Modern World - Simon Winchester
Longitude - Dava Sobel

Paperback

RRP $22.99

$20.75

10%
OFF
Concise Encyclopedia of Poultry Breeds - Fred Hams
Brave New Wild : Can Technology Really Save the Planet? - Richard King
Comic Books : A Graphic History - Blake Hoena