Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Introduction
Chapter 1: The Journey to Data-Driven Security
A Brief History of Learning from Data
Gathering Data Analysis Skills
Centering on a Question
Summary
Recommended Reading
Chapter 2: Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis
Why Python? Why R? And Why Both?
Jumpstarting Your Python Analytics with Canopy
Introducing Data Frames
Organizing Analyses
Summary
Recommended Reading
Chapter 3: Learning the Hello World of Security Data Analysis
Solving a Problem
Getting Data
Reading In Data
Exploring Data
Homing In on a Question
Summary
Recommended Reading
Chapter 4: Performing Exploratory Security Data Analysis
Dissecting the IP Address
Augmenting IP Address Data
Mapping Outside the Continents
Summary
Recommended Reading
Chapter 5: From Maps to Regression
Simplifying Maps
Introducing Linear Regression
Summary
Recommended Reading
Chapter 6: Visualizing Security Data
Why Visualize?
Understanding the Components of Visual Communications
Turning Your Data into a Movie Star
Summary
Recommended Reading
Chapter 7: Learning from Security Breaches
Setting Up the Research
Considerations in a Data Collection Framework
An Introduction to VERIS
Seeing VERIS in Action
Working with VCDB Data
Summary
Recommended Reading
Chapter 8: Breaking Up With Your Relational Database
Realizing the Container Has Constraints
Exploring Alternative Data Stores
Summary
Recommended Reading
Chapter 9: Demystifying Machine Learning
Detecting Malware
Benefiting from Machine Learning
Specific Learning Methods
Hands On: Clustering Breach Data
Summary
Recommended Reading
Chapter 10: Designing Effective Security Dashboards
What Is a Dashboard, Anyway?
Communicating and Managing “Security” through Dashboards
Summary
Recommended Reading
Chapter 11: Building Interactive Security Visualizations
Moving from Static to Interactive
Developing Interactive Visualizations
Summary
Recommended Reading
Chapter 12: Moving Toward Data-Driven Security
Moving Yourself toward Data-Driven Security
Moving Your Organization toward Data-Driven Security
Summary
Recommended Reading
Appendix A: Resources and Tools
Appendix B: References
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
R Packages Used
← Prev
Back
Next →
← Prev
Back
Next →