Cargando…
Data-driven security: analysis, visualization and dashboards
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Wiley
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1663443 |
_version_ | 1780935208709652480 |
---|---|
author | Jacobs, Jay Rudis, Bob |
author_facet | Jacobs, Jay Rudis, Bob |
author_sort | Jacobs, Jay |
collection | CERN |
description | Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma |
id | cern-1663443 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | Wiley |
record_format | invenio |
spelling | cern-16634432021-04-21T21:19:50Zhttp://cds.cern.ch/record/1663443engJacobs, JayRudis, BobData-driven security: analysis, visualization and dashboardsComputing and Computers Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and maWileyoai:cds.cern.ch:16634432014 |
spellingShingle | Computing and Computers Jacobs, Jay Rudis, Bob Data-driven security: analysis, visualization and dashboards |
title | Data-driven security: analysis, visualization and dashboards |
title_full | Data-driven security: analysis, visualization and dashboards |
title_fullStr | Data-driven security: analysis, visualization and dashboards |
title_full_unstemmed | Data-driven security: analysis, visualization and dashboards |
title_short | Data-driven security: analysis, visualization and dashboards |
title_sort | data-driven security: analysis, visualization and dashboards |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1663443 |
work_keys_str_mv | AT jacobsjay datadrivensecurityanalysisvisualizationanddashboards AT rudisbob datadrivensecurityanalysisvisualizationanddashboards |