Uncover hidden patterns of data and respond with countermeasures
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions.
Everything in this book will have practical application for information security professionals.Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networksIncludes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacksCovers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and moreWritten by a team of well-known experts in the field of security and data analysis
Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and "Security Using Data Analysis, Visualization, and Dashboards."
I have seen this book referenced a couple of times as "the" book about how data science/ML can be applied in the security field. However, after reading it, I have to say I don't understand who is this book for. Because if you are a data scientist, this book will not be enough to get you going in the security field and vice versa, if you are a security person, you will not learn how to do data science from this book.
I appreciate the introduction; it is very well written, and succinctly states the arguments for why data-driven decision making is important for the security field. It even provides a nice quick historical context for the ML & stats fields for the layman. However, starting chapter number two, it is only worth skimming through, there is just not enough information to make it worthwhile. The most valuable are perhaps the materials referenced at the end of every chapter.
Good overview at building data into infosec decisions
I liked the build up structure of the book and the way it showed how you would use some of the examples in real life. I would've liked a little more explanation behind why you would use one statistical model over another but overall very nicely done.