|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1043671371 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180709s2015 caua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d MERER
|d STF
|d OCLCQ
|d TOH
|d DEBBG
|d CEF
|d CNCEN
|d G3B
|d S9I
|d UAB
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 1491935782
|
020 |
|
|
|a 9781491935781
|
020 |
|
|
|z 9781491935781
|
029 |
1 |
|
|a GBVCP
|b 1029873305
|
035 |
|
|
|a (OCoLC)1043671371
|
037 |
|
|
|a CL0500000977
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Jinka, Preetam,
|e author.
|
245 |
1 |
0 |
|a Anomaly detection for monitoring :
|b a statistical approach to time series anomaly detection /
|c Preetam Jinka & Baron Schwartz.
|
246 |
3 |
0 |
|a Statistical approach to time series anomaly detection
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed July 9, 2018).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Monitoring, the practice of observing systems and determining if they're healthy, is hard--and getting harder. In a perfect world, your anomaly detection system would warn you about new behaviors and data patterns in time to fix problems before they happened, and would be completely foolproof, never ringing the alarm bell when it shouldn't. Such a system doesn't exist (yet), but that shouldn't make you lose sight of the fact that better anomaly detection is possible and can provide tremendous operational benefits. This report demystifies the topic and clarifies some of the fundamental choices that you have to make when constructing anomaly detection mechanisms. You'll learn why some approaches to anomaly detection work better than others in certain situations, and why a better solution for some challenges may be within reach after all. Authors Preetam Jinka and Baron Schwartz introduce the various types of monitoring systems, explain the logic behind them, and help you to navigate the labyrinth of current anomaly detection by outlining the tradeoffs associated with different approaches so you can make judgments as you reach each fork in the road.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Anomaly detection (Computer security)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Statistics.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Détection d'anomalies (Sécurité informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Anomaly detection (Computer security)
|2 fast
|0 (OCoLC)fst01739215
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Statistics.
|2 fast
|0 (OCoLC)fst01132103
|
700 |
1 |
|
|a Schwartz, Baron,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492042341/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|