Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Data Analysis with Pandas

You're reading from   Hands-On Data Analysis with Pandas Efficiently perform data collection, wrangling, analysis, and visualization using Python

Arrow left icon
Product type Paperback
Published in Jul 2019
Publisher
ISBN-13 9781789615326
Length 740 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Stefanie Molin Stefanie Molin
Author Profile Icon Stefanie Molin
Stefanie Molin
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

Preface 1. Section 1: Getting Started with Pandas
2. Introduction to Data Analysis FREE CHAPTER 3. Working with Pandas DataFrames 4. Section 2: Using Pandas for Data Analysis
5. Data Wrangling with Pandas 6. Aggregating Pandas DataFrames 7. Visualizing Data with Pandas and Matplotlib 8. Plotting with Seaborn and Customization Techniques 9. Section 3: Applications - Real-World Analyses Using Pandas
10. Financial Analysis - Bitcoin and the Stock Market 11. Rule-Based Anomaly Detection 12. Section 4: Introduction to Machine Learning with Scikit-Learn
13. Getting Started with Machine Learning in Python 14. Making Better Predictions - Optimizing Models 15. Machine Learning Anomaly Detection 16. Section 5: Additional Resources
17. The Road Ahead 18. Solutions
19. Other Books You May Enjoy Appendix

Summary

In our second application chapter, we learned how to simulate events in Python and got additional exposure to writing packages. We also saw how to write Python scripts that can be run from the command line, which we used to run our simulation of the login attempt data. Then, we performed some exploratory data analysis on the simulated data to see if we could figure out what would make hacker activity easy to spot.

This led us to zero in on the number of distinct usernames attempting to authenticate per IP address per hour, as well as the number of attempts and failure rates. Using these metrics, we were able to create a scatter plot, which appeared to show two distinct groups of points, along with some other points connecting the two groups; naturally, these represented the groups of valid users and the nefarious ones, with some of the hackers not being as obvious as others...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime