Information security analytics: finding security insights, patterns and anomalies in big data (Record no. 16588)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02244nam a2200265Ia 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250725095343.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 220909b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780128002070 |
| 037 ## - SOURCE OF ACQUISITION | |
| Terms of availability | Textbook |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | CSL |
| Language of cataloging | eng |
| Transcribing agency | CSL |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 084 ## - COLON CLASSIFICATION NUMBER | |
| Classification number | D65,8(B):(894) Q5 TD |
| Assigning agency | CSL |
| 245 #0 - TITLE STATEMENT | |
| Title | Information security analytics: finding security insights, patterns and anomalies in big data |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Waltham : |
| Name of publisher, distributor, etc. | Elsevier, |
| Date of publication, distribution, etc. | 2015. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xv, 166p. |
| Other physical details | : ill. |
| 500 ## - GENERAL NOTE | |
| General note | Index 163-166p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.<br/><br/>Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.<br/><br/>The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Access analytics |
| 9 (RLIN) | 816463 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Security and text mining |
| 9 (RLIN) | 816464 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Analytics and incident response |
| 9 (RLIN) | 816465 |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Talabis, Mark Ryan M |
| Relator term | author |
| 9 (RLIN) | 816466 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Classification part | D65,8(B):(894) Q5 TD |
| Koha item type | Textbook |
| Source of classification or shelving scheme | Colon Classification (CC) |
| Suppress in OPAC | No |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Central Science Library | Central Science Library | 2022-09-12 | 442, 10/03/2015, Limpid Book Service | D65,8(B):(894) Q5 TD | SL1598081 | 2022-09-12 | 2022-09-12 | Textbook |
