9781118793725-1118793722-Data, Driven Security: Analysis, Visualization and Dashboards

Data, Driven Security: Analysis, Visualization and Dashboards

ISBN-13: 9781118793725
ISBN-10: 1118793722
Edition: 1
Author: Jay Jacobs, Bob Rudis
Publication date: 2014
Publisher: Wiley
Format: Paperback 352 pages
FREE US shipping
Buy

From $40.00

Book details

ISBN-13: 9781118793725
ISBN-10: 1118793722
Edition: 1
Author: Jay Jacobs, Bob Rudis
Publication date: 2014
Publisher: Wiley
Format: Paperback 352 pages

Summary

Data, Driven Security: Analysis, Visualization and Dashboards (ISBN-13: 9781118793725 and ISBN-10: 1118793722), written by authors Jay Jacobs, Bob Rudis, was published by Wiley in 2014. With an overall rating of 4.2 stars, it's a notable title among other Networking & Cloud Computing (Security & Encryption) books. You can easily purchase or rent Data, Driven Security: Analysis, Visualization and Dashboards (Paperback) from BooksRun, along with many other new and used Networking & Cloud Computing books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $3.46.

Description

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book