LEADER 04096nam 2200673 450 001 9910463628803321 005 20200520144314.0 010 $a0-12-800506-8 035 $a(CKB)2670000000578337 035 $a(EBL)1873129 035 $a(SSID)ssj0001412083 035 $a(PQKBManifestationID)11864771 035 $a(PQKBTitleCode)TC0001412083 035 $a(PQKBWorkID)11406121 035 $a(PQKB)11349130 035 $a(MiAaPQ)EBC1873129 035 $a(CaSebORM)9780128002070 035 $a(PPN)224152130 035 $a(Au-PeEL)EBL1873129 035 $a(CaPaEBR)ebr10992061 035 $a(CaONFJC)MIL665385 035 $a(OCoLC)910911974 035 $a(EXLCZ)992670000000578337 100 $a20141211h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInformation security analytics $efinding security insights, patterns and anomalies in big data /$fMark Talabis [and three others] ; D. Kaye, technical editor 205 $a1st edition 210 1$aWaltham, Massachusetts :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (183 p.) 300 $aDescription based upon print version of record. 311 $a0-12-800207-7 311 $a1-322-34103-6 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aFront Cover; Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data; Copyright; Dedication; Contents; Foreword; About the Authors; Acknowledgments; Chapter 1 - Analytics Defined; INTRODUCTION TO SECURITY ANALYTICS; CONCEPTS AND TECHNIQUES IN ANALYTICS; DATA FOR SECURITY ANALYTICS; ANALYTICS IN EVERYDAY LIFE; SECURITY ANALYTICS PROCESS; REFERENCES; Chapter 2 - Primer on Analytical Software and Tools; STATISTICAL PROGRAMMING; INTRODUCTION TO DATABASES AND BIG DATA TECHNIQUES; REFERENCES; Chapter 3 - Analytics and Incident Response; INTRODUCTION 327 $aSCENARIOS AND CHALLENGES IN INTRUSIONS AND INCIDENT IDENTIFICATIONANALYSIS OF LOG FILES; LOADING THE DATA; ANOTHER POTENTIAL ANALYTICAL DATA SET: UNSTACKED STATUS CODES; OTHER APPLICABLE SECURITY AREAS AND SCENARIOS; SUMMARY; FURTHER READING; Chapter 4 - Simulations and Security Processes; SIMULATION; CASE STUDY; Chapter 5 - Access Analytics; INTRODUCTION; TECHNOLOGY PRIMER; SCENARIO, ANALYSIS, AND TECHNIQUES; CASE STUDY; ANALYZING THE RESULTS; Chapter 6 - Security and Text Mining; SCENARIOS AND CHALLENGES IN SECURITY ANALYTICS WITH TEXT MINING 327 $aUSE OF TEXT MINING TECHNIQUES TO ANALYZE AND FIND PATTERNS IN UNSTRUCTURED DATASTEP BY STEP TEXT MINING EXAMPLE IN R; OTHER APPLICABLE SECURITY AREAS AND SCENARIOS; Chapter 7 - Security Intelligence and Next Steps; OVERVIEW; SECURITY INTELLIGENCE; SECURITY BREACHES; PRACTICAL APPLICATION; CONCLUDING REMARKS; Index 330 $aInformation Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covere 606 $aComputer security 606 $aInformation resources management$xSecurity measures 606 $aBig data$xSecurity measures 608 $aElectronic books. 615 0$aComputer security. 615 0$aInformation resources management$xSecurity measures. 615 0$aBig data$xSecurity measures. 676 $a005.8 702 $aMark$b Talabis 702 $aKaye$b D. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910463628803321 996 $aInformation security analytics$92481750 997 $aUNINA