Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Introduction Chapter 1: The Journey to Data-Driven Security
A Brief History of Learning from Data Gathering Data Analysis Skills Centering on a Question Summary Recommended Reading
Chapter 2: Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis
Why Python? Why R? And Why Both? Jumpstarting Your Python Analytics with Canopy Introducing Data Frames Organizing Analyses Summary Recommended Reading
Chapter 3: Learning the Hello World of Security Data Analysis
Solving a Problem Getting Data Reading In Data Exploring Data Homing In on a Question Summary Recommended Reading
Chapter 4: Performing Exploratory Security Data Analysis
Dissecting the IP Address Augmenting IP Address Data Mapping Outside the Continents Summary Recommended Reading
Chapter 5: From Maps to Regression
Simplifying Maps Introducing Linear Regression Summary Recommended Reading
Chapter 6: Visualizing Security Data
Why Visualize? Understanding the Components of Visual Communications Turning Your Data into a Movie Star Summary Recommended Reading
Chapter 7: Learning from Security Breaches
Setting Up the Research Considerations in a Data Collection Framework An Introduction to VERIS Seeing VERIS in Action Working with VCDB Data Summary Recommended Reading
Chapter 8: Breaking Up With Your Relational Database
Realizing the Container Has Constraints Exploring Alternative Data Stores Summary Recommended Reading
Chapter 9: Demystifying Machine Learning
Detecting Malware Benefiting from Machine Learning Specific Learning Methods Hands On: Clustering Breach Data Summary Recommended Reading
Chapter 10: Designing Effective Security Dashboards
What Is a Dashboard, Anyway? Communicating and Managing “Security” through Dashboards Summary Recommended Reading
Chapter 11: Building Interactive Security Visualizations
Moving from Static to Interactive Developing Interactive Visualizations Summary Recommended Reading
Chapter 12: Moving Toward Data-Driven Security
Moving Yourself toward Data-Driven Security Moving Your Organization toward Data-Driven Security Summary Recommended Reading
Appendix A: Resources and Tools Appendix B: References
Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 R Packages Used
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion