|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn772458526 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120111s2012 flua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d E7B
|d UV0
|d OTZ
|d CDX
|d OCLCO
|d EBLCP
|d OCLCQ
|d OCLCF
|d DEBSZ
|d OCLCQ
|d CRCPR
|d OCLCQ
|d Z5A
|d IDB
|d LIV
|d MERUC
|d UAB
|d STF
|d OCLCA
|d OCLCQ
|d CEF
|d NLE
|d COO
|d OCLCQ
|d UKMGB
|d WYU
|d YOU
|d YDX
|d TYFRS
|d LEAUB
|d OCLCQ
|d UKAHL
|d LOA
|d UX1
|d OCLCQ
|d U3W
|d LVT
|d VT2
|d BRF
|d OCLCQ
|d OCLCO
|d AAA
|d OCLCO
|d OCLCQ
|d INARC
|d SFB
|d OCLCQ
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBB7A1024
|2 bnb
|
016 |
7 |
|
|a 018372766
|2 Uk
|
019 |
|
|
|a 809977300
|a 961642367
|a 1015205392
|a 1066049491
|a 1087354554
|a 1122513229
|a 1124223067
|a 1127929285
|a 1135530933
|a 1152828672
|a 1156405107
|a 1181902440
|a 1228576242
|a 1240510469
|
020 |
|
|
|a 9781439854556
|q (electronic bk.)
|
020 |
|
|
|a 1439854556
|q (electronic bk.)
|
020 |
|
|
|z 9781439854549
|
020 |
|
|
|z 1439854548
|
024 |
8 |
|
|a 9786613908773
|
029 |
1 |
|
|a AU@
|b 000053282979
|
029 |
1 |
|
|a AU@
|b 000060101361
|
029 |
1 |
|
|a AU@
|b 000062623747
|
029 |
1 |
|
|a CHNEW
|b 000617173
|
029 |
1 |
|
|a DEBBG
|b BV041135342
|
029 |
1 |
|
|a DEBSZ
|b 397191898
|
029 |
1 |
|
|a DEBSZ
|b 43107657X
|
029 |
1 |
|
|a DEBSZ
|b 449277836
|
029 |
1 |
|
|a GBVCP
|b 738771473
|
029 |
1 |
|
|a NZ1
|b 14157270
|
029 |
1 |
|
|a UKMGB
|b 018372766
|
029 |
1 |
|
|a AU@
|b 000068460827
|
035 |
|
|
|a (OCoLC)772458526
|z (OCoLC)809977300
|z (OCoLC)961642367
|z (OCoLC)1015205392
|z (OCoLC)1066049491
|z (OCoLC)1087354554
|z (OCoLC)1122513229
|z (OCoLC)1124223067
|z (OCoLC)1127929285
|z (OCoLC)1135530933
|z (OCoLC)1152828672
|z (OCoLC)1156405107
|z (OCoLC)1181902440
|z (OCoLC)1228576242
|z (OCoLC)1240510469
|
037 |
|
|
|a 390877
|b MIL
|
050 |
|
4 |
|a QA76.9.D343
|b M385 2012eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Masud, Mehedy.
|
245 |
1 |
0 |
|a Data mining tools for malware detection /
|c Mehedy Masud, Latifur Khan, and Bhavani Thuraisingham.
|
260 |
|
|
|a Boca Raton, FL :
|b CRC Press,
|c ©2012.
|
300 |
|
|
|a 1 online resource (xxx, 419 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
500 |
|
|
|a "An Auerbach book."
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a pt. 1. Data mining and security -- pt. 2. Data mining for email worm detection -- pt. 3. Data mining for detecting malicious executables -- pt. 4. Data mining for detecting remote exploits -- pt. 5. Data mining for detecting botnets -- pt. 6. Stream mining for security applications -- pt. 7. Emerging applications.
|
520 |
|
|
|a Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets. The authors describe the systems they have designed and devel.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Data Mining
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Exploration de données (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data mining
|2 fast
|
700 |
1 |
|
|a Khan, Latifur.
|
700 |
1 |
|
|a Thuraisingham, Bhavani M.
|
758 |
|
|
|i has work:
|a Data mining tools for malware detection (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGRfVwwCcMHvCdGXrYYhXm
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Masud, Mehedy.
|t Data mining tools for malware detection.
|d Boca Raton, FL : CRC Press, ©2012
|z 9781439854549
|w (DLC) 2011039383
|w (OCoLC)757935662
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=826949
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n dataminingtoolsf0000masu
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH21641773
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24073776
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 23413013
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL826949
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10518021
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429110689
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n AUP0KE12519PDF
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15918443
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7060609
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11934119
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11934120
|
994 |
|
|
|a 92
|b IZTAP
|