|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn950518678 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
160525s2016 mau ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d IDEBK
|d UIU
|d EBLCP
|d OPELS
|d N$T
|d CDX
|d OCLCF
|d YDXCP
|d GGVRL
|d DEBSZ
|d UMI
|d STF
|d IDB
|d COO
|d VT2
|d MERUC
|d OCLCQ
|d OCLCO
|d U3W
|d OCLCA
|d WRM
|d CNCGM
|d D6H
|d OCLCQ
|d UOK
|d CEF
|d KSU
|d EZ9
|d OCLCQ
|d DEBBG
|d OCLCQ
|d WYU
|d UAB
|d LQU
|d DCT
|d OCLCQ
|d S2H
|d OCLCO
|d DST
|d LVT
|d OCLCO
|d OCL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 950689896
|a 951221751
|a 956735839
|a 957614854
|a 965800894
|a 968121545
|a 1105190366
|a 1105566135
|a 1162073197
|a 1300453184
|a 1302261844
|a 1303363666
|
020 |
|
|
|a 9780128004784
|q (electronic bk.)
|
020 |
|
|
|a 0128004789
|q (electronic bk.)
|
020 |
|
|
|a 0128000066
|
020 |
|
|
|a 9780128000069
|
020 |
|
|
|z 9780128000069
|
024 |
3 |
|
|a 9780128000069
|
029 |
1 |
|
|a AU@
|b 000058949560
|
029 |
1 |
|
|a AU@
|b 000066136148
|
029 |
1 |
|
|a AU@
|b 000067093736
|
029 |
1 |
|
|a AU@
|b 000068133336
|
029 |
1 |
|
|a CHNEW
|b 001013572
|
029 |
1 |
|
|a CHNEW
|b 001026569
|
029 |
1 |
|
|a DEBBG
|b BV043893713
|
029 |
1 |
|
|a DEBSZ
|b 480361274
|
029 |
1 |
|
|a DEBSZ
|b 48247095X
|
029 |
1 |
|
|a GBVCP
|b 879396334
|
029 |
1 |
|
|a GBVCP
|b 897159225
|
035 |
|
|
|a (OCoLC)950518678
|z (OCoLC)950689896
|z (OCoLC)951221751
|z (OCoLC)956735839
|z (OCoLC)957614854
|z (OCoLC)965800894
|z (OCoLC)968121545
|z (OCoLC)1105190366
|z (OCoLC)1105566135
|z (OCoLC)1162073197
|z (OCoLC)1300453184
|z (OCoLC)1302261844
|z (OCoLC)1303363666
|
037 |
|
|
|a CL0500000806
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Threat forecasting :
|b leveraging big data for predictive analysis /
|c John Pirc, David DeSanto, Iain Davison, Will Gragido.
|
264 |
|
1 |
|a Cambridge, MA :
|b Syngress is an imprint of Elsevier,
|c 2016.
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ScienceDirect, viewed June 6, 2016).
|
505 |
0 |
|
|a Front Cover; Threat Forecasting: Leveraging Big Data for Predictive Analysis; Copyright; Contents; About the Authors; Foreword; Why Threat Forecasting is Relevant; What You Will Learn and How You Will Benefit; Preface; Book Organization and Structure; Closing Thoughts; Acknowledgments; Chapter 1: Navigating Todays Threat Landscape; Introduction; Why Threat Forecasting; The Effects of a Data Breach; Barriers to Adopting Threat Forecasting Practices; Going Beyond Historical Threat Reporting; Timing; Generalization; The State of Regulatory Compliance; Industry Specific Guidelines.
|
505 |
8 |
|
|a Healthcare InstitutionsFinancial Institutions; Cyber Security Information Sharing Legislation: Watch this Space; Best Practices, Standards, and Frameworks; PCI DSS; NIST Cyber Security Framework; Defense in Depth; Tier 1 Security Technologies; Tier 2 Security Technologies; Update and Evaluate Security Products and Technologies; Cyber Security and the Human Factor; Today's Information Assurance Needs; Chapter 2: Threat Forecasting; Synopsis; Introduction; Threat Forecasting; Dangers of Technology Sprawl; High Speed Big Data Collection and Surveillance; Threat Epidemiology.
|
505 |
8 |
|
|a High Frequency Security AlgorithmsSummary; Chapter 3: Security Intelligence; Synopsis; Introduction; Security Intelligence; Information Vetting; KPIs; Programs; Scripts; Shortcuts; Other; Office Macros; Do It Yourself (DIY) Security Intelligence; Build; Buy; Partner; Key Indicator Attributes; Dissemination of Intelligence; Summary; Chapter 4: Identifying Knowledge Elements; Synopsis; Introduction; Defining Knowledge Elements; Intelligence Versus Information; A Quick Note About the Signal-to-Noise Ratio Metaphor; A Brief Note on IOCs and IOIs.
|
505 |
8 |
|
|a Identifying Something Important Through the Use of IOAs, IOCs, and IOIsTypes of Knowledge Elements; IOA or Pre-attack Indicators; Indicators of Compromise; Indicators of Interest; Publicly Defined Knowledge Elements; OpenIOC; How It Works; How Do You Get It; Incident Object Description Exchange Format (RFC5070); IODEF Data Model; IODEF Implementation; IOCBucket.com; Cyber Observable eXpression; Summary; Chapter 5: Knowledge Sharing and Community Support; Synopsis; Introduction; Sharing Knowledge Elements; Advantages; Disadvantages; Community Sharing; VERIS; OpenIOC; TAXII; STIX; CybOX.
|
505 |
8 |
|
|a Commercial OfferingsStaying Ahead of the Adversary; Summary; Chapter 6: Data Visualization; Synopsis; Introduction; Common Methods; Big Data Analytics; Interactive Visualization; Not Just For the Boardroom; Summary; Chapter 7: Data Simulation; Synopsis; Introduction; Traffic Simulation vs Emulation; Environmental; Flow; Data Sandboxes; Analytic Engines; Quantum Computing; Summary; Chapter 8: Kill Chain Modeling; Synopsis; Introduction; Key Components of Kill Chain Modeling; Leveraging Big Data; Tools Available; Maltego; Splunk; OpenGraphiti; Creation of Data Files; STIX; Kill Chains in STIX.
|
520 |
|
|
|a This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Big data.
|
650 |
|
0 |
|a Forecasting.
|
650 |
|
2 |
|a Forecasting
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Prévision.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Données volumineuses.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Networking.
|2 bisacsh
|
650 |
|
7 |
|a Forecasting
|2 fast
|
650 |
|
7 |
|a Big data
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Pirc, John,
|e author.
|
700 |
1 |
|
|a DeSanto, David,
|e author.
|
700 |
1 |
|
|a Davison, Iain,
|e author.
|
700 |
1 |
|
|a Gragido, Will,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Pirc, John.
|t Threat Forecasting : Leveraging Big Data for Predictive Analysis.
|d Saint Louis : Elsevier Science, ©2016
|z 9780128000069
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128004784/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 34613531
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4529569
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1144055
|
938 |
|
|
|a Gale Cengage Learning
|b GVRL
|n GVRL9JRX
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis34613531
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13004530
|
994 |
|
|
|a 92
|b IZTAP
|