Library Logo

Information security analytics : finding security insights, patterns, and anomalies in big data / (Record no. 247010)

000 -LEADER
fixed length control field 03403cam a2200601Ii 4500
001 - CONTROL NUMBER
control field ocn896901266
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190328114809.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr mn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141006t20152015maua ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency UKMGB
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency UKMGB
Modifying agency OCLCO
-- N$T
-- YDXCP
-- UIU
-- N$T
-- UMI
-- TEFOD
-- COO
-- WAU
-- DEBBG
-- B24X7
-- STF
-- DEBSZ
-- TEFOD
-- OCLCQ
-- OSU
-- OCLCQ
-- VGM
-- LIV
-- OCLCA
-- BUF
-- OCLCF
-- U3W
-- D6H
-- INT
-- OCLCQ
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 016947801
Source Uk
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 016945760
Source Uk
019 ## -
-- 899607334
-- 963737788
-- 966848495
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128005064
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128005068
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128002070
Qualifying information (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0128002077
Qualifying information (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)896901266
Canceled/invalid control number (OCoLC)899607334
-- (OCoLC)963737788
-- (OCoLC)966848495
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number T3358 2015
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Talabis, Mark,
Relator term author.
245 10 - TITLE STATEMENT
Title Information security analytics : finding security insights, patterns, and anomalies in big data /
Medium [electronic resource]
Statement of responsibility, etc. Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Waltham, MA :
Name of producer, publisher, distributor, manufacturer Syngress,
Date of production, publication, distribution, manufacture, or copyright notice [2015]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice �2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xv, 166 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --
Assigning source Edited summary from book.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Analytics Defined -- Primer on Analytical Software and Tools -- Analytics and Incident Response -- Simulations and Security Processes -- Access Analytics -- Security and Text Mining -- Security Intelligence and Next Steps.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information resources management
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Big data
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Internet
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Networking
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
Authority record control number (OCoLC)fst00872484
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information resources management
General subdivision Security measures.
Source of heading or term fast
Authority record control number (OCoLC)fst00972614
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcgft
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name McPherson, Robert,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Miyamoto, I,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Martin, Jason L.,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Talabis, Mark Ryan M.
Title Information Security Analytics.
Place, publisher, and date of publication Waltham, MA : Syngress, [2015]
International Standard Book Number 9780128002070
Record control number (OCoLC)903214048
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified ScienceDirect
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780128002070

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login