|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn896901266 |
003 |
OCoLC |
005 |
20231120111916.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
141006t20152015maua ob 001 0 eng d |
040 |
|
|
|a UKMGB
|b eng
|e rda
|e pn
|c UKMGB
|d OCLCO
|d N$T
|d YDXCP
|d UIU
|d N$T
|d UMI
|d TEFOD
|d COO
|d WAU
|d DEBBG
|d B24X7
|d STF
|d DEBSZ
|d TEFOD
|d OCLCQ
|d OSU
|d OCLCQ
|d VGM
|d LIV
|d OCLCA
|d BUF
|d OCLCF
|d U3W
|d D6H
|d INT
|d OCLCQ
|d DCT
|d ERF
|d OCLCA
|d BRF
|d MM9
|d OCLCO
|d OCLCQ
|d TOH
|d OCLCQ
|d INARC
|d OCLCO
|
016 |
7 |
|
|a 016947801
|2 Uk
|
016 |
7 |
|
|a 016945760
|2 Uk
|
019 |
|
|
|a 899607334
|a 963737788
|a 966848495
|a 1166552045
|a 1173671127
|a 1180935120
|a 1391555034
|
020 |
|
|
|a 9780128005064
|q (electronic bk.)
|
020 |
|
|
|a 0128005068
|q (electronic bk.)
|
020 |
|
|
|z 9780128002070
|q (pbk.)
|
020 |
|
|
|z 0128002077
|q (pbk.)
|
035 |
|
|
|a (OCoLC)896901266
|z (OCoLC)899607334
|z (OCoLC)963737788
|z (OCoLC)966848495
|z (OCoLC)1166552045
|z (OCoLC)1173671127
|z (OCoLC)1180935120
|z (OCoLC)1391555034
|
050 |
|
4 |
|a QA76.9.A25
|b T3358 2015
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Talabis, Mark Ryan M.,
|e author.
|
245 |
1 |
0 |
|a Information security analytics :
|b finding security insights, patterns, and anomalies in big data /
|c Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor.
|
264 |
|
1 |
|a Waltham, MA :
|b Syngress,
|c [2015]
|
264 |
|
4 |
|c �2015
|
300 |
|
|
|a 1 online resource (xv, 166 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --
|c Edited summary from book.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Analytics Defined -- Primer on Analytical Software and Tools -- Analytics and Incident Response -- Simulations and Security Processes -- Access Analytics -- Security and Text Mining -- Security Intelligence and Next Steps.
|
588 |
0 |
|
|a Print version record.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Information resources management
|x Security measures.
|
650 |
|
0 |
|a Big data
|x Security measures.
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Gestion de l'information
|0 (CaQQLa)201-0139097
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
6 |
|a Donn�ees volumineuses
|0 (CaQQLa)000284673
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Information resources management
|x Security measures
|2 fast
|0 (OCoLC)fst00972614
|
700 |
1 |
|
|a McPherson, Robert,
|e author.
|
700 |
1 |
|
|a Miyamoto, I,
|e author.
|
700 |
1 |
|
|a Martin, Jason L.,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Talabis, Mark Ryan M.
|t Information Security Analytics.
|d Waltham, MA : Syngress, [2015]
|z 9780128002070
|w (OCoLC)903214048
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128002070
|z Texto completo
|