Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Information security analytics : (Record no. 10172)

MARC details
000 -LEADER
fixed length control field 04228cam a2200577 i 4500
001 - CONTROL NUMBER
control field 896901266
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210418120712.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141006s2015 maua o 000 0 eng d
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB4D1374
Source bnb
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB4C9335
Source bnb
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128002070 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128005064
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128005068
035 ## - SYSTEM CONTROL NUMBER
System control number .b38095622
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)896901266
Canceled/invalid control number (OCoLC)899607334
037 ## - SOURCE OF ACQUISITION
Stock number CL0500000525
Source of stock number/acquisition Safari Books Online
037 ## - SOURCE OF ACQUISITION
Stock number F5A4F859-DEFE-4DC9-AD2C-D30043616D68
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
040 ## - CATALOGING SOURCE
Original cataloging agency UKMGB
Language of cataloging eng
Transcribing agency UKMGB
Modifying agency OCLCO
-- N$T
-- YDXCP
-- UIU
-- N$T
-- UMI
-- TEFOD
Description conventions rda
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number T3358 2015
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number I
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Talabis, Mark,
Relator term author.
245 10 - TITLE STATEMENT
Title Information security analytics :
Remainder of title finding security insights, patterns, and anomalies in big data /
Statement of responsibility, etc Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Massachusetts :
Name of publisher, distributor, etc Syngress,
Date of publication, distribution, etc 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 166 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent.
336 ## - CONTENT TYPE
Content type term still image
Source rdacontent.
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier.
500 ## - GENERAL NOTE
General note computer bookfair2016
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Analytics Defined<br/><br/>Chapter 2: Primer on Analytics Software and Tools<br/><br/>Chapter 3: Analytics and Incident Response<br/><br/>Chapter 4: Simulations and Security Processes<br/><br/>Chapter 5: Access Analytics<br/><br/>Chapter 6: Technical Risk Profiling<br/><br/>Chapter 7: Security Intelligence and Next Steps
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Available to OhioLINK libraries.
520 ## - SUMMARY, ETC.
Summary, etc Information Security Analytics gives you insights into the practice of analytics and more importantly analytic techniques to identify trends and outliers, which may not be possible using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you to mine data and to identify patterns and relationships in security data. Using the techniques covered in this book, you will be able to gain security insight into unstructured data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques using case studies. They demonstrate how you can use freely available tools to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks in your organization. Written by security practitioners, for security practitioners, Learn about open-source analytics and statistical packages, tools and applications, Real-world case studies and scenarios are provided for each analytics technique, Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided, Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes, Learn how to utilize big data techniques to assist in incident response and intrusion analysis Book jacket.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information resources management
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Big data
General subdivision Security measures.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name McPherson, Robert,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Miyamoto, I,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Martin, Jason L.,
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Ohio Library and Information Network.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
International Standard Book Number 9780128002070.
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract
Uniform Resource Identifier <a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3650">http://repository.fue.edu.eg/xmlui/handle/123456789/3650</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Acquisition method Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Information systems ) Main library Main library A2 02/02/2016 Academic bookshop 540.00 Purchase   005.8 I 00012957 19/02/2025 02/02/2016 Books