

{"id":2896,"date":"2014-02-09T23:10:28","date_gmt":"2014-02-10T04:10:28","guid":{"rendered":"http:\/\/rud.is\/b\/?p=2896"},"modified":"2014-02-09T23:10:28","modified_gmt":"2014-02-10T04:10:28","slug":"data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/","title":{"rendered":"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords &#038; Reproducible Research"},"content":{"rendered":"<p>Jay Jacobs (@jayjacobs)&mdash;my co-author of the soon-to-be-released book [Data-Driven Security](http:\/\/amzn.to\/ddsec)&mdash;&#038; I have been hard at work over at the book&#8217;s [sister-blog](http:\/\/dds.ec\/blog) cranking out code to help security domain experts delve into the dark art of data science.<\/p>\n<p>We&#8217;ve covered quite a bit of ground since January 1<sup>st<\/sup>, but I&#8217;m using this post to focus more on what we&#8217;ve produced using R, since that&#8217;s our go-to language.<\/p>\n<p>Jay used the blog to do a [long-form answer](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Jan\/severski\/) to a question asked by @dseverski on the [SIRA](http:\/\/societyinforisk.org) mailing list and I piled on by adding a [Shiny app](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Jan\/solvo-mediocris\/) into the mix (both posts make for a pretty `#spiffy` introduction to expert-opinion risk analyses in R).<\/p>\n<p>Jay continued by [releasing a new honeypot data set](http:\/\/datadrivensecurity.info\/blog\/data\/2014\/01\/marx.gz) and corresponding two-part<sup>[<\/sup><sup>[1](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Jan\/blander-part1\/)<\/sup><sup>,<\/sup><sup>[2](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Jan\/blander-part2\/)<\/sup><sup>]<\/sup> post series to jump start analyses on that data. (There&#8217;s a D3 geo-visualization stuck in-between those posts if you&#8217;re into that sort of thing).<\/p>\n<p>I got it into my head to start a project to build a [password dump analytics tool](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Feb\/ripal\/) in R (with **much** more coming soon on that, including a full-on R package + Shiny app combo) and also continue the discussion we started in the book on the need for the infusion of reproducible research principles and practices in the information security domain by building off of @sucuri_security&#8217;s [Darkleech botnet](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Feb\/reproducible-research-sucuri-darkleech-data\/) research.<\/p>\n<p>You can follow along at home with the blog via it&#8217;s [RSS feed](http:\/\/datadrivensecurity.info\/blog\/feeds\/all.atom.xml) or via the @ddsecblog Twitter account. You can also **play** along at home if you feel you have something to contribute. It&#8217;s as simple as a github pull request and some really straightforward markdown. Take a look the blog&#8217;s [github repo](https:\/\/github.com\/ddsbook\/blog) and hit me up (@hrbrmstr) for details if you&#8217;ve got something to share.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jay Jacobs (@jayjacobs)&mdash;my co-author of the soon-to-be-released book [Data-Driven Security](http:\/\/amzn.to\/ddsec)&mdash;&#038; I have been hard at work over at the book&#8217;s [sister-blog](http:\/\/dds.ec\/blog) cranking out code to help security domain experts delve into the dark art of data science. We&#8217;ve covered quite a bit of ground since January 1st, but I&#8217;m using this post to focus more [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[677,709,678,673,674,3,91,4,66],"tags":[],"class_list":["post-2896","post","type-post","status-publish","format-standard","hentry","category-data-analysis-2","category-data-driven-security","category-data-visualization","category-datavis-2","category-dataviz","category-information-security","category-r","category-risk","category-risk-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords &amp; Reproducible Research - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords &amp; Reproducible Research - rud.is\" \/>\n<meta property=\"og:description\" content=\"Jay Jacobs (@jayjacobs)&mdash;my co-author of the soon-to-be-released book [Data-Driven Security](http:\/\/amzn.to\/ddsec)&mdash;&#038; I have been hard at work over at the book&#8217;s [sister-blog](http:\/\/dds.ec\/blog) cranking out code to help security domain experts delve into the dark art of data science. We&#8217;ve covered quite a bit of ground since January 1st, but I&#8217;m using this post to focus more [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-10T04:10:28+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/02\\\/09\\\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/02\\\/09\\\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords &#038; Reproducible Research\",\"datePublished\":\"2014-02-10T04:10:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/02\\\/09\\\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\\\/\"},\"wordCount\":383,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"articleSection\":[\"Data Analysis\",\"data driven security\",\"Data Visualization\",\"DataVis\",\"DataViz\",\"Information Security\",\"R\",\"Risk\",\"Risk Assessment\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/02\\\/09\\\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/02\\\/09\\\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/02\\\/09\\\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\\\/\",\"name\":\"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords & Reproducible Research - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2014-02-10T04:10:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/02\\\/09\\\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/02\\\/09\\\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/02\\\/09\\\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords &#038; Reproducible Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords & Reproducible Research - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/","og_locale":"en_US","og_type":"article","og_title":"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords & Reproducible Research - rud.is","og_description":"Jay Jacobs (@jayjacobs)&mdash;my co-author of the soon-to-be-released book [Data-Driven Security](http:\/\/amzn.to\/ddsec)&mdash;&#038; I have been hard at work over at the book&#8217;s [sister-blog](http:\/\/dds.ec\/blog) cranking out code to help security domain experts delve into the dark art of data science. We&#8217;ve covered quite a bit of ground since January 1st, but I&#8217;m using this post to focus more [&hellip;]","og_url":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/","og_site_name":"rud.is","article_published_time":"2014-02-10T04:10:28+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords &#038; Reproducible Research","datePublished":"2014-02-10T04:10:28+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/"},"wordCount":383,"commentCount":1,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"articleSection":["Data Analysis","data driven security","Data Visualization","DataVis","DataViz","Information Security","R","Risk","Risk Assessment"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/","url":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/","name":"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords & Reproducible Research - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2014-02-10T04:10:28+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords &#038; Reproducible Research"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-KI","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":2938,"url":"https:\/\/rud.is\/b\/2014\/03\/15\/guardian-words-visualized\/","url_meta":{"origin":2896,"position":0},"title":"Guardian Words: Visualized","author":"hrbrmstr","date":"2014-03-15","format":false,"excerpt":"Andy Kirk (@visualisingdata) & Lynn Cherny (@arnicas) tweeted about the Guardian Word Count service\/archive site, lamenting the lack of visualizations: Want to know num of words written in each day's Guardian paper by section + approx reading time? http:\/\/t.co\/wP4W1EzUsx via @bengoldacre\u2014 Andy Kirk (@visualisingdata) March 15, 2014 This gave me\u2026","rel":"","context":"In &quot;Data Visualization&quot;","block_context":{"text":"Data Visualization","link":"https:\/\/rud.is\/b\/category\/data-visualization\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2912,"url":"https:\/\/rud.is\/b\/2014\/02\/12\/one-more-yet-another-olympic-medal-live-tracking-shiny-app\/","url_meta":{"origin":2896,"position":1},"title":"One More (Yet-another?) Olympic Medal Live-tracking Shiny App","author":"hrbrmstr","date":"2014-02-12","format":false,"excerpt":"I'm posting this mostly to show how to: - use the Google spreadsheet data-munging \"hack\" from the [previous post](http:\/\/rud.is\/b\/2014\/02\/11\/live-google-spreadsheet-for-keeping-track-of-sochi-medals\/) in a Shiny context - include it seamlessly into a web page, and - run it locally without a great deal of wrangling The code for the app is [in this\u2026","rel":"","context":"In &quot;data driven security&quot;","block_context":{"text":"data driven security","link":"https:\/\/rud.is\/b\/category\/data-driven-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2871,"url":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/","url_meta":{"origin":2896,"position":2},"title":"Announcing The Launch Of The Data Driven Security [Blog|Podcast]","author":"hrbrmstr","date":"2014-01-06","format":false,"excerpt":"While you're waiting for the [book](http:\/\/amzn.to\/ddsec) by @jayjacobs & @hrbrmstr to hit the shelves, why not head on over to the inaugural post of the [Data Driven Security Blog](http:\/\/datadrivensecurity.info\/blog) & give a listen to the first episode of the [Data Driven Security Podcast](http:\/\/datadrivensecurity.info\/podcast). The Data Driven Security Blog aspires to\u2026","rel":"","context":"In &quot;Data Analysis&quot;","block_context":{"text":"Data Analysis","link":"https:\/\/rud.is\/b\/category\/data-analysis-2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2803,"url":"https:\/\/rud.is\/b\/2013\/11\/27\/mapping-power-outages-in-maine-dynamically-with-shinyr\/","url_meta":{"origin":2896,"position":3},"title":"Mapping Power Outages in Maine Dynamically with Shiny\/R","author":"hrbrmstr","date":"2013-11-27","format":false,"excerpt":"I decided to forego the D3 map mentioned in the previous post in favor of a Shiny one since I had 90% of the mapping code written. I binned the ranges into three groups, changed the color over to something more pleasant (with RColorBrewer), added an interactive table for the\u2026","rel":"","context":"In &quot;data driven security&quot;","block_context":{"text":"data driven security","link":"https:\/\/rud.is\/b\/category\/data-driven-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/11\/162.243.111.4_3838_outages_.png?fit=470%2C735&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2889,"url":"https:\/\/rud.is\/b\/2014\/01\/31\/data-driven-security-the-book-update-shamelessselfpromotion\/","url_meta":{"origin":2896,"position":4},"title":"Data-Driven Security (The Book)  Update #ShamelessSelfPromotion","author":"hrbrmstr","date":"2014-01-31","format":false,"excerpt":"If I made a Venn diagram of the cross-section of readers of this blog and the [Data Driven Security](http:\/\/dds.ec\/) web sites it might be indistinguishable from a pure circle. However, just in case there are a few stragglers out there, I figured one more post on the fact that the\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2782,"url":"https:\/\/rud.is\/b\/2013\/11\/13\/visual-anatomy-of-r-packages-used-in-data-driven-security\/","url_meta":{"origin":2896,"position":5},"title":"Visual Anatomy Of R Packages Used in Data Driven Security","author":"hrbrmstr","date":"2013-11-13","format":false,"excerpt":"Since @jayjacobs & I are down to the home stretch on Data Driven Security, I thought it would be interesting to do some post-writing pseudo-analyses of the book itself. I won't have exact page or word counts for a bit, but I wanted to see how many R packages we\u2026","rel":"","context":"In &quot;Data Analysis&quot;","block_context":{"text":"Data Analysis","link":"https:\/\/rud.is\/b\/category\/data-analysis-2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/2896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=2896"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/2896\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=2896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=2896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=2896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}