Threat Forecasting: Leveraging Big Data for Predictive Analysis
Autor John Pirc, David DeSanto, Iain Davison, Will Gragidoen Limba Engleză Paperback – 16 mai 2016
- Presents case studies and actual data to demonstrate threat data visualization techniques and threat simulation tools
- Explores the usage of kill chain modelling to inform actionable security intelligence
- Demonstrates a methodology that can be used to create a full threat forecast analysis for enterprise networks of any size
Preț: 324.64 lei
Preț vechi: 405.80 lei
-20% Nou
Puncte Express: 487
Preț estimativ în valută:
62.14€ • 64.76$ • 51.72£
62.14€ • 64.76$ • 51.72£
Carte tipărită la comandă
Livrare economică 04-18 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128000069
ISBN-10: 0128000066
Pagini: 188
Dimensiuni: 191 x 235 x 32 mm
Greutate: 0.39 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0128000066
Pagini: 188
Dimensiuni: 191 x 235 x 32 mm
Greutate: 0.39 kg
Editura: ELSEVIER SCIENCE
Cuprins
1. Navigating Today’s Threat Landscape 2. Threat Forecasting 3. Security Intelligence 4. Identifying Knowledge Elements 5. Knowledge Sharing and Community Support 6. Data Visualization 7. Data Simulation 8. Kill Chain Modeling 9. Connecting the Dots 10. The Road Ahead
Recenzii
"The authors have rooted this text in real-world implementations and approaches, but with enough of a grounding in the concepts that what you learn here will remain relevant as, inevitably, the nature of the threats we face, and of the kinds of threat forecasting that emerge to tackle them, continue to evolve." --Network Security
"If you’re looking for a book to give a solid overview of what threat forecasting can do for your organization, you don’t have to look further. It’s concise and coherent, provides great real-world examples, is short enough to read in one or two sittings, and provides good advice on getting colleagues and management to support the effort..." --Help Net Security
"If you’re looking for a book to give a solid overview of what threat forecasting can do for your organization, you don’t have to look further. It’s concise and coherent, provides great real-world examples, is short enough to read in one or two sittings, and provides good advice on getting colleagues and management to support the effort..." --Help Net Security