Big data analytics in cybersecurity/ (Record no. 52185)

MARC details
000 -LEADER
fixed length control field 01824nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field IN-BdCUP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240430110420.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240430b ii ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367240233
040 ## - CATALOGING SOURCE
Language of cataloging eng
Transcribing agency IN-BdCUP
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number SAV
245 ## - TITLE STATEMENT
Title Big data analytics in cybersecurity/
Statement of responsibility, etc. Edited by Onur Savas, & Julia Deng
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton:
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. 2023.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 336 pages ;
Dimensions 24 cm.
Type of unit HB
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Applying Big Data into Different Cybersecurity Aspects. The Power of Big Data in Cybersecurity. Big Data for Network Forensics. Dynamic Analytics-Driven Assessment of Vulnerabilities and Exploitation. Root Cause Analysis for Cybersecurity. Data Visualization for Cybersecurity. Cybersecurity Training. Machine Unlearning: Repairing Learning Models in Adversarial Environments. Big Data in Emerging Cybersecurity Domains. Big Data Analytics for Mobile App Security. Security, Privacy, and Trust in Cloud Computing. Cybersecurity in Internet of Things (IoT). Big Data Analytics for Security in Fog Computing. Analyzing Deviant Socio-Technical Behaviors Using Social Network Analysis and Cyber Forensics-Based Methodologies. Tools and Datasets for Cybersecurity. Security Tools. Data and Research Initiatives for Cybersecurity Analysis. Index.
520 ## - SUMMARY, ETC.
Summary, etc. This book gives a comprehensive coverage of state-of-the-art big data analytics in cybersecurity and IT management. The topics include threat analysis, vulnerability identification, mission analysis, network monitoring, network management, visualization, and cybertraining. Each topic is examined in detail in a case study.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks Security measures
Topical term or geographic name entry element Big data
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Savas, Onur
Relator term Editor
Personal name Deng, Julia
Relator term Editor
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Date acquired Source of acquisition Order Number Cost, normal purchase price Bill number Total checkouts Full call number Barcode Date last seen Actual Cost, replacement price Bill Date Koha item type
    Dewey Decimal Classification     Computer Science and Technology Ranganathan Library Ranganathan Library 13/03/2024 Today & Tomorrow Printers and publishers 23-24/389 2796.00 TTPP/573/23-24   005.8 SAV 050390 30/04/2024 3495.00 08/03/2024 Book
This system is made operational by the in-house staff of the CUP Library.