دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Jay Jacobs. Bob Rudis
سری:
ISBN (شابک) : 1118793722, 9781118793725
ناشر: Wiley
سال نشر: 2014
تعداد صفحات: 0
زبان: English
فرمت فایل : MOBI (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 72 مگابایت
در صورت تبدیل فایل کتاب Data-Driven Security: Analysis, Visualization and Dashboards به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت مبتنی بر داده: تجزیه و تحلیل ، تجسم و داشبورد نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
الگوهای پنهان داده را کشف کنید و با اقدامات متقابل پاسخ دهید
متخصصان امنیتی به همه ابزارهایی که در اختیار دارند برای افزایش دید خود برای جلوگیری از نقضهای امنیتی و حملات نیاز دارند. این راهنمای دقیق دو مورد از قدرتمندترین آنها را بررسی می کند؟ تجزیه و تحلیل و تجسم داده ها به زودی خواهید فهمید که چگونه داده ها را از جمع آوری و ذخیره سازی گرفته تا مدیریت و تجزیه و تحلیل و همچنین تجسم و ارائه به کار ببرید. این کتاب با استفاده از یک رویکرد عملی با مثالهای دنیای واقعی، به شما نشان میدهد که چگونه بازخورد جمعآوری کنید، اثربخشی روشهای امنیتی خود را اندازهگیری کنید، و تصمیمگیری بهتری بگیرید.
همه چیز در این کتاب کاربرد عملی دارد. متخصصان امنیت اطلاعات.
شبکه های خود را قفل کنید، از هک شدن و جلوگیری از بدافزار توسط im اثبات قابلیت مشاهده در محیط، همه از طریق قدرت داده و امنیت با استفاده از تجزیه و تحلیل داده، تجسم، و داشبورد.
Uncover hidden patterns of data and respond with countermeasures
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions.
Everything in this book will have practical application for information security professionals.
Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards.
Cover Title Page Copyright Contents Introduction Overview of the Book and Technologies How This Book Is Organized Who Should Read This Book Tools You Will Need What’s on the Website The Journey Begins! Chapter 1 The Journey to Data-Driven Security A Brief History of Learning from Data Nineteenth Century Data Analysis Twentieth Century Data Analysis Twenty-First Century Data Analysis Gathering Data Analysis Skills Domain Expertise Programming Skills Data Management Statistics Visualization (a.k.a. Communication) Combining the Skills Centering on a Question Creating a Good Research Question Exploratory Data Analysis Summary Recommended Reading Chapter 2 Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis Why Python? Why R? And Why Both? Why Python? Why R? Why Both? Jumpstarting Your Python Analytics with Canopy Understanding the Python Data Analysis and Visualization Ecosystem Setting Up Your R Environment Introducing Data Frames Organizing Analyses Summary Recommended Reading Chapter 3 Learning the “Hello World” of Security Data Analysis Solving a Problem Getting Data Reading In Data Exploring Data Homing In on a Question Summary Recommended Reading Chapter 4 Performing Exploratory Security Data Analysis Dissecting the IP Address Representing IP Addresses Segmenting and Grouping IP Addresses Locating IP Addresses Augmenting IP Address Data Association/Correlation, Causation, and Security Operations Center Analysts Gone Rogue Mapping Outside the Continents Visualizing the ZeuS Botnet Visualizing Your Firewall Data Summary Recommended Reading Chapter 5 From Maps to Regression Simplifying Maps How Many ZeroAccess Infections per Country? Changing the Scope of Your Data The Potwin Effect Is This Weird? Counting in Counties Moving Down to Counties Introducing Linear Regression Understanding Common Pitfalls in Regression Analysis Regression on ZeroAccess Infections Summary Recommended Reading Chapter 6 Visualizing Security Data Why Visualize? Unraveling Visual Perception Understanding the Components of Visual Communications Avoiding the Third Dimension Using Color Putting It All Together Communicating Distributions Visualizing Time Series Experiment on Your Own Turning Your Data into a Movie Star Summary Recommended Reading Chapter 7 Learning from Security Breaches Setting Up the Research Considerations in a Data Collection Framework Aiming for Objective Answers Limiting Possible Answers Allowing “Other,” and “Unknown” Options Avoiding Conflation and Merging the Minutiae An Introduction to VERIS Incident Tracking Threat Actor Threat Actions Information Assets Attributes Discovery/Response Impact Victim Indicators Extending VERIS with Plus Seeing VERIS in Action Working with VCDB Data Getting the Most Out of VERIS Data Summary Recommended Reading Chapter 8 Breaking Up with Your Relational Database Realizing the Container Has Constraints Constrained by Schema Constrained by Storage Constrained by RAM Constrained by Data Exploring Alternative Data Stores BerkeleyDB Redis Hive MongoDB Special Purpose Databases Summary Recommended Reading Chapter 9 Demystifying Machine Learning Detecting Malware Developing a Machine Learning Algorithm Validating the Algorithm Implementing the Algorithm Benefiting from Machine Learning Answering Questions with Machine Learning Measuring Good Performance Selecting Features Validating Your Model Specific Learning Methods Supervised Unsupervised Hands On: Clustering Breach Data Multidimensional Scaling on Victim Industries Hierarchical Clustering on Victim Industries Summary Recommended Reading Chapter 10 Designing Effective Security Dashboards What Is a Dashboard, Anyway? A Dashboard Is Not an Automobile A Dashboard Is Not a Report A Dashboard Is Not a Moving Van A Dashboard Is Not an Art Show Communicating and Managing “Security” through Dashboards Lending a Hand to Handlers Raising Dashboard Awareness The Devil (and Incident Response Delays) Is in the Details Projecting “Security” Summary Recommended Reading Chapter 11 Building Interactive Security Visualizations Moving from Static to Interactive Interaction for Augmentation Interaction for Exploration Interaction for Illumination Developing Interactive Visualizations Building Interactive Dashboards with Tableau Building Browser-Based Visualizations with D3 Summary Recommended Reading Chapter 12 Moving Toward Data-Driven Security Moving Yourself toward Data-Driven Security The Hacker The Statistician The Security Domain Expert The Danger Zone Moving Your Organization toward Data-Driven Security Ask Questions That Have Objective Answers Find and Collect Relevant Data Learn through Iteration Find Statistics Summary Recommended Reading Appendix A Resources and Tools Appendix B References Index