Cargando…

Data-driven security: analysis, visualization and dashboards

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You�...

Descripción completa

Detalles Bibliográficos
Autores principales: Jacobs, Jay, Rudis, Bob
Lenguaje:eng
Publicado: Wiley 2014
Materias:
Acceso en línea:http://cds.cern.ch/record/1663443
_version_ 1780935208709652480
author Jacobs, Jay
Rudis, Bob
author_facet Jacobs, Jay
Rudis, Bob
author_sort Jacobs, Jay
collection CERN
description Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma
id cern-1663443
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2014
publisher Wiley
record_format invenio
spelling cern-16634432021-04-21T21:19:50Zhttp://cds.cern.ch/record/1663443engJacobs, JayRudis, BobData-driven security: analysis, visualization and dashboardsComputing and Computers Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and maWileyoai:cds.cern.ch:16634432014
spellingShingle Computing and Computers
Jacobs, Jay
Rudis, Bob
Data-driven security: analysis, visualization and dashboards
title Data-driven security: analysis, visualization and dashboards
title_full Data-driven security: analysis, visualization and dashboards
title_fullStr Data-driven security: analysis, visualization and dashboards
title_full_unstemmed Data-driven security: analysis, visualization and dashboards
title_short Data-driven security: analysis, visualization and dashboards
title_sort data-driven security: analysis, visualization and dashboards
topic Computing and Computers
url http://cds.cern.ch/record/1663443
work_keys_str_mv AT jacobsjay datadrivensecurityanalysisvisualizationanddashboards
AT rudisbob datadrivensecurityanalysisvisualizationanddashboards