Information security analytics: finding security insights, patterns, and anomalies in big data
The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat sim...
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
[2015]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780128002070/?ar |
Zusammenfassung: | The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. -- |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xv, 166 Seiten) illustrations |
ISBN: | 9780128005064 0128005068 9780128002070 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047405775 | ||
003 | DE-627-1 | ||
005 | 20240228115715.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9780128005064 |c electronic bk. |9 978-0-12-800506-4 | ||
020 | |a 0128005068 |c electronic bk. |9 0-12-800506-8 | ||
020 | |a 9780128002070 |9 978-0-12-800207-0 | ||
035 | |a (DE-627-1)047405775 | ||
035 | |a (DE-599)KEP047405775 | ||
035 | |a (ORHE)9780128002070 | ||
035 | |a (DE-627-1)047405775 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Talabis, Mark Ryan M. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Information security analytics |b finding security insights, patterns, and anomalies in big data |c Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor |
264 | 1 | |a Waltham, MA |b Syngress |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 Online-Ressource (xv, 166 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. -- | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Information resources management |x Security measures | |
650 | 0 | |a Big data |x Security measures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Gestion de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Données volumineuses ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information resources management ; Security measures | |
700 | 1 | |a McPherson, Robert |e VerfasserIn |4 aut | |
700 | 1 | |a Miyamoto, I |e VerfasserIn |4 aut | |
700 | 1 | |a Martin, Jason L. |e VerfasserIn |4 aut | |
776 | 1 | |z 9780128002070 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128002070 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780128002070/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047405775 |
---|---|
_version_ | 1821494909901733888 |
adam_text | |
any_adam_object | |
author | Talabis, Mark Ryan M. McPherson, Robert Miyamoto, I Martin, Jason L. |
author_facet | Talabis, Mark Ryan M. McPherson, Robert Miyamoto, I Martin, Jason L. |
author_role | aut aut aut aut |
author_sort | Talabis, Mark Ryan M. |
author_variant | m r m t mrm mrmt r m rm i m im j l m jl jlm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047405775 (DE-599)KEP047405775 (ORHE)9780128002070 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02893cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-047405775</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115715.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128005064</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-800506-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128005068</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-800506-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128002070</subfield><subfield code="9">978-0-12-800207-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047405775</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047405775</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780128002070</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047405775</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Talabis, Mark Ryan M.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security analytics</subfield><subfield code="b">finding security insights, patterns, and anomalies in big data</subfield><subfield code="c">Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 166 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information resources management</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Big data</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Données volumineuses ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McPherson, Robert</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miyamoto, I</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martin, Jason L.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780128002070</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128002070</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780128002070/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047405775 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:52Z |
institution | BVB |
isbn | 9780128005064 0128005068 9780128002070 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xv, 166 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress |
record_format | marc |
spelling | Talabis, Mark Ryan M. VerfasserIn aut Information security analytics finding security insights, patterns, and anomalies in big data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor Waltham, MA Syngress [2015] ©2015 1 Online-Ressource (xv, 166 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. -- Computer security Information resources management Security measures Big data Security measures Sécurité informatique Gestion de l'information ; Sécurité ; Mesures Données volumineuses ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Information resources management ; Security measures McPherson, Robert VerfasserIn aut Miyamoto, I VerfasserIn aut Martin, Jason L. VerfasserIn aut 9780128002070 Erscheint auch als Druck-Ausgabe 9780128002070 |
spellingShingle | Talabis, Mark Ryan M. McPherson, Robert Miyamoto, I Martin, Jason L. Information security analytics finding security insights, patterns, and anomalies in big data Computer security Information resources management Security measures Big data Security measures Sécurité informatique Gestion de l'information ; Sécurité ; Mesures Données volumineuses ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Information resources management ; Security measures |
title | Information security analytics finding security insights, patterns, and anomalies in big data |
title_auth | Information security analytics finding security insights, patterns, and anomalies in big data |
title_exact_search | Information security analytics finding security insights, patterns, and anomalies in big data |
title_full | Information security analytics finding security insights, patterns, and anomalies in big data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor |
title_fullStr | Information security analytics finding security insights, patterns, and anomalies in big data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor |
title_full_unstemmed | Information security analytics finding security insights, patterns, and anomalies in big data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor |
title_short | Information security analytics |
title_sort | information security analytics finding security insights patterns and anomalies in big data |
title_sub | finding security insights, patterns, and anomalies in big data |
topic | Computer security Information resources management Security measures Big data Security measures Sécurité informatique Gestion de l'information ; Sécurité ; Mesures Données volumineuses ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Information resources management ; Security measures |
topic_facet | Computer security Information resources management Security measures Big data Security measures Sécurité informatique Gestion de l'information ; Sécurité ; Mesures Données volumineuses ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Information resources management ; Security measures |
work_keys_str_mv | AT talabismarkryanm informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata AT mcphersonrobert informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata AT miyamotoi informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata AT martinjasonl informationsecurityanalyticsfindingsecurityinsightspatternsandanomaliesinbigdata |