Big data analytics in cybersecurity/ (Record no. 52185)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01824nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IN-BdCUP |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240430110420.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240430b ii ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780367240233 |
040 ## - CATALOGING SOURCE | |
Language of cataloging | eng |
Transcribing agency | IN-BdCUP |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | SAV |
245 ## - TITLE STATEMENT | |
Title | Big data analytics in cybersecurity/ |
Statement of responsibility, etc. | Edited by Onur Savas, & Julia Deng |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boca Raton: |
Name of publisher, distributor, etc. | CRC Press, |
Date of publication, distribution, etc. | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvi, 336 pages ; |
Dimensions | 24 cm. |
Type of unit | HB |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Applying Big Data into Different Cybersecurity Aspects. The Power of Big Data in Cybersecurity. Big Data for Network Forensics. Dynamic Analytics-Driven Assessment of Vulnerabilities and Exploitation. Root Cause Analysis for Cybersecurity. Data Visualization for Cybersecurity. Cybersecurity Training. Machine Unlearning: Repairing Learning Models in Adversarial Environments. Big Data in Emerging Cybersecurity Domains. Big Data Analytics for Mobile App Security. Security, Privacy, and Trust in Cloud Computing. Cybersecurity in Internet of Things (IoT). Big Data Analytics for Security in Fog Computing. Analyzing Deviant Socio-Technical Behaviors Using Social Network Analysis and Cyber Forensics-Based Methodologies. Tools and Datasets for Cybersecurity. Security Tools. Data and Research Initiatives for Cybersecurity Analysis. Index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book gives a comprehensive coverage of state-of-the-art big data analytics in cybersecurity and IT management. The topics include threat analysis, vulnerability identification, mission analysis, network monitoring, network management, visualization, and cybertraining. Each topic is examined in detail in a case study. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks Security measures |
Topical term or geographic name entry element | Big data |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Savas, Onur |
Relator term | Editor |
Personal name | Deng, Julia |
Relator term | Editor |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Suppress in OPAC | No |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Date acquired | Source of acquisition | Order Number | Cost, normal purchase price | Bill number | Total checkouts | Full call number | Barcode | Date last seen | Actual Cost, replacement price | Bill Date | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Computer Science and Technology | Ranganathan Library | Ranganathan Library | 13/03/2024 | Today & Tomorrow Printers and publishers | 23-24/389 | 2796.00 | TTPP/573/23-24 | 005.8 SAV | 050390 | 30/04/2024 | 3495.00 | 08/03/2024 | Book |