Origin: United Kingdom
(Import costs included in the price)
It will be shipped from our warehouse between Thursday, May 23 and Monday, June 03.
You will receive it anywhere in United States between 1 and 3 business days after shipment.
Data - Driven Security: Analysis, Visualization And Dashboards
Jay Jacobs, Bob Rudis
Synopsis "Data - Driven Security: Analysis, Visualization And Dashboards"
Everything In The Book Will Have Practical Application For Information Security Professionals. The Entire Purpose Of Data Analysis And Visualization Is To Gather Feedback From The Environment To Make Better And More Informed Technology Decisions. Within Information Security That Means Identifying Ways To Prevent Or Detect Breaches And Then Measuring The Effectiveness In Doing So, Which Is All Wrapped Up Under Risk Management. All Of The Examples Will Be Directed At Answering Real - World Questions. One Of The Key Points Is Not Just To Analyze What Is In Front Of Us, But Collect And Analyze The Data We Need To Answer The Questions That Will Lead To Better Decisions And Prevention Of Hacks And Vulnerabilities. The Book Will Present The Core Elements Of Analyzing I. T. System Data And Information Security Feedback By Using 30 Use Cases And Domain - Specific Data Sets With A Focus On Practical How - To. This Hands - On Approach Will Be Covered In Context And Will Not Be Limited To Just The Analysis, But All The Supporting Skills Needed To Learn From Our Data. Data Analysis From Start To Finish: From The Data Collection And Preparation Through The Data Storage And Management Fundamentals Then Into The Analysis And Finally Data Visualization And Communication Techniques All In The Context Of Security. Use Cases Will Include: Discovering Anomalous Firewall Traffic How To Acquire And Prepare Security Data Creating A Repeatable Data Analysis Toolkit And Workflow Whitehat Stats Report Security Event Correlation Vulnerability Counts Using Inferential Stats To Detect Malware Outbreaks Visualizing System Logs Mapping Botnets Using Nlp And Data Loss Prevention Predicting Rogue Behavior How To Perform Predictive Analytics