This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.