000 | 03403cam a2200601Ii 4500 | ||
---|---|---|---|
001 | ocn896901266 | ||
003 | OCoLC | ||
005 | 20190328114809.0 | ||
006 | m o d | ||
007 | cr mn||||||||| | ||
008 | 141006t20152015maua ob 001 0 eng d | ||
040 |
_aUKMGB _beng _erda _epn _cUKMGB _dOCLCO _dN$T _dYDXCP _dUIU _dN$T _dUMI _dTEFOD _dCOO _dWAU _dDEBBG _dB24X7 _dSTF _dDEBSZ _dTEFOD _dOCLCQ _dOSU _dOCLCQ _dVGM _dLIV _dOCLCA _dBUF _dOCLCF _dU3W _dD6H _dINT _dOCLCQ |
||
016 | 7 |
_a016947801 _2Uk |
|
016 | 7 |
_a016945760 _2Uk |
|
019 |
_a899607334 _a963737788 _a966848495 |
||
020 |
_a9780128005064 _q(electronic bk.) |
||
020 |
_a0128005068 _q(electronic bk.) |
||
020 |
_z9780128002070 _q(pbk.) |
||
020 |
_z0128002077 _q(pbk.) |
||
035 |
_a(OCoLC)896901266 _z(OCoLC)899607334 _z(OCoLC)963737788 _z(OCoLC)966848495 |
||
050 | 4 |
_aQA76.9.A25 _bT3358 2015 |
|
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aTalabis, Mark, _eauthor. |
|
245 | 1 | 0 |
_aInformation security analytics : finding security insights, patterns, and anomalies in big data / _h[electronic resource] _cMark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor. |
264 | 1 |
_aWaltham, MA : _bSyngress, _c[2015] |
|
264 | 4 | _c�2015 | |
300 |
_a1 online resource (xv, 166 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
520 |
_aThe authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. -- _cEdited summary from book. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aAnalytics Defined -- Primer on Analytical Software and Tools -- Analytics and Incident Response -- Simulations and Security Processes -- Access Analytics -- Security and Text Mining -- Security Intelligence and Next Steps. | |
588 | 0 | _aPrint version record. | |
650 | 0 | _aComputer security. | |
650 | 0 |
_aInformation resources management _xSecurity measures. |
|
650 | 0 |
_aBig data _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aInformation resources management _xSecurity measures. _2fast _0(OCoLC)fst00972614 |
|
655 | 4 | _aElectronic books. | |
655 | 7 |
_aElectronic books. _2lcgft |
|
700 | 1 |
_aMcPherson, Robert, _eauthor. |
|
700 | 1 |
_aMiyamoto, I, _eauthor. |
|
700 | 1 |
_aMartin, Jason L., _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aTalabis, Mark Ryan M. _tInformation Security Analytics. _dWaltham, MA : Syngress, [2015] _z9780128002070 _w(OCoLC)903214048 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128002070 |
999 |
_c247010 _d247010 |