Jump to ratings and reviews
Rate this book

Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

Rate this book
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.

182 pages, Paperback

First published October 15, 2014

4 people are currently reading
11 people want to read

About the author

Mark Talabis

2 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
1 (25%)
4 stars
1 (25%)
3 stars
2 (50%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
Profile Image for Anthony.
9 reviews2 followers
August 20, 2015
Great section on tm.

The authors do confuse XSS and CSRF and have a few "interesting" strategies for digging through logs, but overall the book is fairly solid.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.