Information security analytics finding security insights, patterns, and anomalies in big data

The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat sim...

Full description

Bibliographic Details
Main Authors: Talabis, Mark, McPherson, Robert (Author), Miyamoto, I (Author), Martin, Jason L. (Author)
Format: eBook
Language:English
Published: Waltham, MA Syngress 2015, 2015
Subjects:
Online Access:
Collection: Elsevier ScienceDirect eBooks - Collection details see MPG.ReNa
LEADER 02123nmm a2200397 u 4500
001 EB001033119
003 EBX01000000000000000826641
005 00000000000000.0
007 cr|||||||||||||||||||||
008 150528 ||| eng
020 |a 9780128005064 
020 |a 0128005068 
020 |a 9780128002070  |c (pbk.) 
020 |a 0128002077 
020 |a 9780128002070 
100 1 |a Talabis, Mark 
245 0 0 |a Information security analytics  |h [electronic resource]  |h Elektronische Ressource  |b finding security insights, patterns, and anomalies in big data  |c Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor 
260 |a Waltham, MA  |b Syngress  |c 2015, 2015 
300 |a online resource (xv, 166 pages)  |b illustrations 
505 0 |a Includes bibliographical references and index 
653 |a Computer security 
653 |a Information resources management / Security measures 
653 |a Big data / Security measures 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a COMPUTERS / Security / General / bisacsh 
700 1 |a McPherson, Robert  |e [author] 
700 1 |a Miyamoto, I  |e [author] 
700 1 |a Martin, Jason L.  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ESD  |a Elsevier ScienceDirect eBooks 
015 |a GBB4D1374 
015 |a GBB4C9335 
856 4 0 |u http://www.sciencedirect.com/science/book/9780128002070  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --