Big data analytics in cybersecurity and IT management / (Record no. 48915)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01609cmm a2200289 a 4500 |
001 - CONTROL NUMBER | |
control field | 46905 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IN-BdCUP |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230426175605.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230426s2023 u eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781315154374 |
040 ## - CATALOGING SOURCE | |
Language of cataloging | eng |
Transcribing agency | IN-BdCUP |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.800 |
Item number | S266 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Savas, Onur |
245 #0 - TITLE STATEMENT | |
Title | Big data analytics in cybersecurity and IT management / |
Statement of responsibility, etc. | Onur Savas and Julia Deng |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boca Raton : |
Name of publisher, distributor, etc. | CRC Press, |
Date of publication, distribution, etc. | 2017 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | The power of big data in cybersecurity -- Big data analytics for network forensics -- Dynamic analytics-driven assessment of vulnerabilities and exploitation -- Big data analytics for mobile app security -- Machine unlearning: repairing learning models in adversarial -- Environments -- Cybersecurity training -- Machine unlearning: repairing learning models in adversarial environments -- Big data analytics for mobile app security -- Security, privacy and trust in cloud computing: challenges and solutions -- Cybersecurity in internet of things (IOT) -- Data visualization for cyber security -- Analyzing deviant socio-technical behaviors using social network analysis and cyber forensics-based methodologies -- Security tools -- Data and research initiatives for cybersecurity analysis |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
Topical term or geographic name entry element | Computer networks |
Topical term or geographic name entry element | Information technology |
Topical term or geographic name entry element | Big data |
Topical term or geographic name entry element | Database security |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Deng, Julia |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Electronic Book Resource |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781315154374">https://www.taylorfrancis.com/books/9781315154374</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | E-Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Total checkouts | Full call number | Barcode | Date last seen | Uniform resource identifier | Bill Date | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Ranganathan Library | Ranganathan Library | 07/04/2022 | Taylor & Francis | 005.800 S266 | E01509 | 26/04/2023 | https://www.taylorfrancis.com/books/9781315154374 | 07/04/2022 | E-Book |