Threat Forecasting

Leveraging Big Data for Predictive Analysis

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Threat Forecasting by John Pirc, David DeSanto, Iain Davison, Will Gragido, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: John Pirc, David DeSanto, Iain Davison, Will Gragido ISBN: 9780128004784
Publisher: Elsevier Science Publication: May 17, 2016
Imprint: Syngress Language: English
Author: John Pirc, David DeSanto, Iain Davison, Will Gragido
ISBN: 9780128004784
Publisher: Elsevier Science
Publication: May 17, 2016
Imprint: Syngress
Language: English

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

  • Presents case studies and actual data to demonstrate threat data visualization techniques and threat simulation tools
  • Explores the usage of kill chain modelling to inform actionable security intelligence
  • Demonstrates a methodology that can be used to create a full threat forecast analysis for enterprise networks of any size
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

More books from Elsevier Science

Cover of the book Juvenile Osteology by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book The Immune Response by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Quantum Systems in Physics, Chemistry and Biology - Theory, Interpretation and Results by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Artificial Intelligence in Engineering Design by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Physics for Chemists by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Progress in Optics by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Gas Turbine Engineering Handbook by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book A Combined MRI and Histology Atlas of the Rhesus Monkey Brain in Stereotaxic Coordinates by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Creativity and Humor by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Uranium and Nuclear Energy: 1982 by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Oxidative Damage to Plants by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Computational Methods in Reactor Shielding by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Google Earth Forensics by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Separation of Functional Molecules in Food by Membrane Technology by John Pirc, David DeSanto, Iain Davison, Will Gragido
Cover of the book Thoughts on Interaction Design by John Pirc, David DeSanto, Iain Davison, Will Gragido
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy