Libros importados con hasta 40% OFF + Envío gratis a todo USA  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Data - Driven Security: Analysis, Visualization And Dashboards
Type
Physical Book
Publisher
Topic
Networking, Security
Pages
352
Format
Paper
Dimensions
18.73 x 23.34 cm.
ISBN
1118793722
ISBN13
9781118793725

Data - Driven Security: Analysis, Visualization And Dashboards

Jay Jacobs, Bob Rudis (Author) · Wiley · Paper

Data - Driven Security: Analysis, Visualization And Dashboards - Jay Jacobs, Bob Rudis

Physical Book

$ 58.33

$ 97.22

You save: $ 38.89

40% discount
  • Condition: New
Origin: United Kingdom (Import costs included in the price)
It will be shipped from our warehouse between Thursday, May 23 and Monday, June 03.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Data - Driven Security: Analysis, Visualization And Dashboards"

Everything In The Book Will Have Practical Application For Information Security Professionals. The Entire Purpose Of Data Analysis And Visualization Is To Gather Feedback From The Environment To Make Better And More Informed Technology Decisions. Within Information Security That Means Identifying Ways To Prevent Or Detect Breaches And Then Measuring The Effectiveness In Doing So, Which Is All Wrapped Up Under Risk Management. All Of The Examples Will Be Directed At Answering Real - World Questions. One Of The Key Points Is Not Just To Analyze What Is In Front Of Us, But Collect And Analyze The Data We Need To Answer The Questions That Will Lead To Better Decisions And Prevention Of Hacks And Vulnerabilities. The Book Will Present The Core Elements Of Analyzing I. T. System Data And Information Security Feedback By Using 30 Use Cases And Domain - Specific Data Sets With A Focus On Practical How - To. This Hands - On Approach Will Be Covered In Context And Will Not Be Limited To Just The Analysis, But All The Supporting Skills Needed To Learn From Our Data. Data Analysis From Start To Finish: From The Data Collection And Preparation Through The Data Storage And Management Fundamentals Then Into The Analysis And Finally Data Visualization And Communication Techniques All In The Context Of Security. Use Cases Will Include: Discovering Anomalous Firewall Traffic How To Acquire And Prepare Security Data Creating A Repeatable Data Analysis Toolkit And Workflow Whitehat Stats Report Security Event Correlation Vulnerability Counts Using Inferential Stats To Detect Malware Outbreaks Visualizing System Logs Mapping Botnets Using Nlp And Data Loss Prevention Predicting Rogue Behavior How To Perform Predictive Analytics

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The binding of this edition is Paper.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews