Information security analytics: finding security insights, patterns and anomalies in big data (Record no. 16588)

MARC details
000 -LEADER
fixed length control field 02244nam a2200265Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250725095343.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220909b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128002070
037 ## - SOURCE OF ACQUISITION
Terms of availability Textbook
040 ## - CATALOGING SOURCE
Original cataloging agency CSL
Language of cataloging eng
Transcribing agency CSL
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
084 ## - COLON CLASSIFICATION NUMBER
Classification number D65,8(B):(894) Q5 TD
Assigning agency CSL
245 #0 - TITLE STATEMENT
Title Information security analytics: finding security insights, patterns and anomalies in big data
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Waltham :
Name of publisher, distributor, etc. Elsevier,
Date of publication, distribution, etc. 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 166p.
Other physical details : ill.
500 ## - GENERAL NOTE
General note Index 163-166p.
520 ## - SUMMARY, ETC.
Summary, etc. Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.<br/><br/>Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.<br/><br/>The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Access analytics
9 (RLIN) 816463
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Security and text mining
9 (RLIN) 816464
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Analytics and incident response
9 (RLIN) 816465
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Talabis, Mark Ryan M
Relator term author
9 (RLIN) 816466
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Classification part D65,8(B):(894) Q5 TD
Koha item type Textbook
Source of classification or shelving scheme Colon Classification (CC)
Suppress in OPAC No
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Central Science Library Central Science Library 2022-09-12 442, 10/03/2015, Limpid Book Service   D65,8(B):(894) Q5 TD SL1598081 2022-09-12 2022-09-12 Textbook
Copyright @ Delhi University Library System