- Paperback: 352 pages
- Publisher: Wiley; 1 edition (February 24, 2014)
- Language: English
- ISBN-10: 1118793722
- ISBN-13: 978-1118793725
- Product Dimensions: 7.4 x 0.7 x 9.1 inches
- Shipping Weight: 1.8 pounds (View shipping rates and policies)
- Average Customer Review: 21 customer reviews
- Amazon Best Sellers Rank: #363,376 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Data-Driven Security: Analysis, Visualization and Dashboards 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Frequently bought together
Customers who bought this item also bought
Customers who viewed this item also viewed
From the Back Cover
A practical guide to securing your data and IT infrastructure
From safeguarding corporate data to keeping e-commerce transactions secure, today’s IT professionals are tasked with enormous and complex data security responsibilities. In Data-Driven Security, Jay Jacobs and Bob Rudis draw together three of the most important topics in IT—security, data analysis, and visualization—to present a real-world security strategy to defend your networks. Turning their backs on insufficient security based on hunches and best practices, the authors help you access the world of security data analysis and visualization, where real data drives security decisions, and they teach you to apply the principles of that security with real-world cases.
- Develop an understanding of how to acquire, prepare, and visualize security data
- Learn how to use the analytical and visualization tools in R and Python
- Dissect IP addresses to find malicious activity
- Map security data and learn statistical techniques to look for significant connections
- Understand how visual communication works and how it can help you see and present your data clearly
- Develop effective, informative security dashboards
- Design analytical models to help you detect malicious behavior
- Gain practical “how-to” knowledge from specific, real-world use cases detailing an array of data and network security scenarios
Visit the companion website at www.wiley.com/go/datadrivensecurity for additional information and resources
About the Author
Jay Jacobs is the coauthor of Verizon Data Breach Investigation Reports and the cofounder of the Society of Information Risk Analysts, where he currently sits on the board of directors.
Bob Rudis is the Director of Enterprise Information Security & IT Risk Management at Liberty Mutual Insurance and was named one of the Top 25 Influencers in Information Security by Tripwire.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
...saying that had this book been out when I started, I could have just read it instead. The authors do a fantastic job at parsing the most important messages and examples from each book and seamlessly integrate it into an engaging read. There is a little bit of a (dare I say) sales pitch about specific toolsets the authors are vested in, but that makes sense. That is why they are subject matter experts in the field. I cannot recommend this book enough to anyone who wants to start making sense of statistics and visualizations in the cyber security field. It is even a good book for people who are experts as it provides the "one stop shop" for many of the facts and lessons contained in the aforementioned bibliography.
The exercises are excellent. I had difficulty with both Chapter 8 and 9. Part of that is the version of Canopy Python I downloaded didn't support some of the packages they used. A shame because these were the two key chapters for me. The earlier version (2.7) do, so I'd recommend sticking with that. They list a large number of URLs in the book but that forces us to try typing those into a browser window. It would be nice if a resource were available with the book resources already available.
Edit to add: Bob Rudis took the time to tweet me and provide a URL to the very resources I was hoping for: http://datadrivensecurity.info/blog/pages/resources.html
Not only a great book but after the read support!!
Most recent customer reviews
“The Limits of Spreadsheets
On January 16th, 2013, J.P.Read more