MARC details
| 000 -LEADER |
| fixed length control field |
04228cam a2200577 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
896901266 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210418120712.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
| fixed length control field |
m d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr ||||||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
141006s2015 maua o 000 0 eng d |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
GBB4D1374 |
| Source |
bnb |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
GBB4C9335 |
| Source |
bnb |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780128002070 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780128005064 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0128005068 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
.b38095622 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)896901266 |
| Canceled/invalid control number |
(OCoLC)899607334 |
| 037 ## - SOURCE OF ACQUISITION |
| Stock number |
CL0500000525 |
| Source of stock number/acquisition |
Safari Books Online |
| 037 ## - SOURCE OF ACQUISITION |
| Stock number |
F5A4F859-DEFE-4DC9-AD2C-D30043616D68 |
| Source of stock number/acquisition |
OverDrive, Inc. |
| Note |
http://www.overdrive.com |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
UKMGB |
| Language of cataloging |
eng |
| Transcribing agency |
UKMGB |
| Modifying agency |
OCLCO |
| -- |
N$T |
| -- |
YDXCP |
| -- |
UIU |
| -- |
N$T |
| -- |
UMI |
| -- |
TEFOD |
| Description conventions |
rda |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
T3358 2015 |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
060040 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
043050 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
053000 |
| Source |
bisacsh |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
I |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Talabis, Mark, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Information security analytics : |
| Remainder of title |
finding security insights, patterns, and anomalies in big data / |
| Statement of responsibility, etc |
Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Massachusetts : |
| Name of publisher, distributor, etc |
Syngress, |
| Date of publication, distribution, etc |
2015. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xv, 166 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent. |
| 336 ## - CONTENT TYPE |
| Content type term |
still image |
| Source |
rdacontent. |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Source |
rdamedia. |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Source |
rdacarrier. |
| 500 ## - GENERAL NOTE |
| General note |
computer bookfair2016 |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 1: Analytics Defined<br/><br/>Chapter 2: Primer on Analytics Software and Tools<br/><br/>Chapter 3: Analytics and Incident Response<br/><br/>Chapter 4: Simulations and Security Processes<br/><br/>Chapter 5: Access Analytics<br/><br/>Chapter 6: Technical Risk Profiling<br/><br/>Chapter 7: Security Intelligence and Next Steps |
| 506 ## - RESTRICTIONS ON ACCESS NOTE |
| Terms governing access |
Available to OhioLINK libraries. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
Information Security Analytics gives you insights into the practice of analytics and more importantly analytic techniques to identify trends and outliers, which may not be possible using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you to mine data and to identify patterns and relationships in security data. Using the techniques covered in this book, you will be able to gain security insight into unstructured data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques using case studies. They demonstrate how you can use freely available tools to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks in your organization. Written by security practitioners, for security practitioners, Learn about open-source analytics and statistical packages, tools and applications, Real-world case studies and scenarios are provided for each analytics technique, Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided, Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes, Learn how to utilize big data techniques to assist in incident response and intrusion analysis Book jacket. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Information resources management |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Big data |
| General subdivision |
Security measures. |
| 655 #4 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
McPherson, Robert, |
| Relator term |
author. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Miyamoto, I, |
| Relator term |
author. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Martin, Jason L., |
| Relator term |
author. |
| 710 2# - ADDED ENTRY--CORPORATE NAME |
| Corporate name or jurisdiction name as entry element |
Ohio Library and Information Network. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Display text |
Print version: |
| International Standard Book Number |
9780128002070. |
| 856 ## - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Abstract |
| Uniform Resource Identifier |
<a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3650">http://repository.fue.edu.eg/xmlui/handle/123456789/3650</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |