Information security analytics : finding security insights, patterns and anomalies in big data (Record no. 103053)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01529nam a22001817a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 978-0128002070 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 TAL |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Talabis, Mark; McPherson, Robert,; Miyamoto, Isamu |
245 ## - TITLE STATEMENT | |
Title | Information security analytics : finding security insights, patterns and anomalies in big data |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boston |
Name of publisher, distributor, etc. | Elsevier |
Date of publication, distribution, etc. | 2015 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xv,166p. |
Other physical details | 23 cm ; Pbk |
500 ## - GENERAL NOTE | |
General note | SRS Books #395 - 17 Dec 2016 Rs.4226,50/- |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | • Analytics Defined <br/>• Primer on Analytical Software and Tools <br/>• Analytics and Incident Response <br/>• Simulations and Security Processes <br/>• Access Analytics <br/>• Security and Text Mining <br/>• Security Intelligence and Next Steps |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
-- | Information resources management--Security measures |
-- | Big data -- Security measures |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://store.elsevier.com/Information-Security-Analytics/Mark-Talabis/isbn-9780128002070/">http://store.elsevier.com/Information-Security-Analytics/Mark-Talabis/isbn-9780128002070/</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GSB Collection | 02/12/2016 | 005.8 TAL | B2260 | 02/12/2016 | 02/12/2016 | Books |