Slideshow 10 IT Security Books for Big Data Scientists

  • September 17 2015, 6:45am EDT
12 Images Total

10 IT Security Books for Big Data Scientists

As the big data and cybersecurity markets converge with one another, each of these books examines new threats and new opportunities for data scientists who want to analyze and safeguard data.

1. The Realities of Securing Big Data 1st Edition, by Davi Ottenheimer

Summary: “More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents IT managers with a difficult dilemma. On the one hand everyone from the smallest company to the largest government is beginning to make use of giant lakes of information. On the other hand, more harm than benefit looms when considering many of the realities of big data security. Even without specific solutions there may be workarounds and compensating controls to consider. The Realities of Big Data helps IT leaders identify how and where to best protect Big Data environments from disclosure, disruption or loss.” Source: Amazon.

Content Continues Below

2. Data-Driven Security: Analysis, Visualization and Dashboards 1st Edition, by Jay Jacobs and Bob Rudis

Summary: “Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful: data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions.” Source: Amazon.

3. Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data 1st Edition, by multiple authors

Summary: “Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.” Source: Amazon.

4. Hadoop Security: Protecting Your Big Data Platform 1st Edition, by Ben Spivey and Joey Echeverria

Summary: “As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.” Source: Amazon.

Content Continues Below

5. Big Data: A Primer (Studies in Big Data), by Hrushikesha Mohanty, Prachet Bhuyan and Deepak Chenthati

Summary: “This book is a collection of chapters written by experts on various aspects of big data. It covers a wide range of issues including management of heterogeneous data, big data frameworks, change management, finding patterns in data usage and evolution, data as a service, service-generated data, service management, privacy and security. All of these aspects are touched upon in this book.” Source: Amazon.

6. Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies 1st Edition, by multiple authors

Summary: Gain “state-of-the-art concepts, methods, and technologies for big data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue.” Source: Amazon.

7. Privacy and Big Data 1st Edition, by Terence Craig and Mary E. Ludloff

Summary: “Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.” Source: Amazon.

Content Continues Below

8. Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security, 1st Edition, by Omar Santos

Summary: This is the “definitive guide to using NetFlow to strengthen network security.” Omar Santos, technical leader of Cisco's Product Security Incident Response Team (PSIRT), covers what you need to “successfully capture network telemetry…and utilize big data analytics to improve IT security.” Source: Amazon.

9. To the Cloud: Big Data in a Turbulent World, by Vincent Mosco

Summary: “In the wake of revelations about National Security Agency activities?many of which occur “in the cloud”?this book offers both enlightenment and a critical view. Cloud computing and big data are arguably the most significant forces in information technology today.” This book “provides the first thorough analysis of the potential and the problems of a technology that may very well disrupt the world.” Source: Amazon.

10. Compromised Data: From Social Media to Big Data, by multiple authors

Summary: This book “explores we perform critical research within a compromised social data framework. The expert, international lineup of contributors explores the limits and challenges of social data research in order to invent and develop new modes of doing public research. At its core, this collection argues that we are witnessing a fundamental reshaping of the social through social data mining.” Source: Amazon.

Content Continues Below

Thank You and More

Thanks to Amazon for the book links. Find additional Information Management slide shows here.