000 -LEADER |
fixed length control field |
01939cam a2200361 i 4500 |
001 - CONTROL NUMBER |
control field |
19866550 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
APU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190111073532.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190105t20172017flua 000 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2017013953 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781498772129 (hbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1498772129 (hbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
WAN |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
B54 2017 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
245 10 - TITLE STATEMENT |
Title |
Big data analytics in cybersecurity / |
Statement of responsibility, etc |
edited by Onur Savas, Julia Deng. |
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boca Raton : |
Name of publisher, distributor, etc |
CRC Press, Taylor & Francis Group, |
Date of publication, distribution, etc |
[2017] |
260 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Date of publication, distribution, etc |
©2017 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 336 p. : |
Other physical details |
ill. (some col.) ; |
Dimensions |
24 cm. |
490 0# - SERIES STATEMENT |
Series statement |
Data analytics applications |
500 ## - GENERAL NOTE |
General note |
"An Auerbach book" |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
The power of big data in cybersecurity -- Big data analytics for network forensics -- Dynamic analytics-driven assessment of vulnerabilities and exploitation -- Big data analytics for mobile app security -- Machine unlearning: repairing learning models in adversarial -- Environments -- Cybersecurity training -- Machine unlearning: repairing learning models in adversarial environments -- Big data analytics for mobile app security -- Security, privacy and trust in cloud computing: challenges and solutions -- Cybersecurity in internet of things (IOT) -- Data visualization for cyber security -- Analyzing deviant socio-technical behaviors using social network analysis and cyber forensics-based methodologies -- Security tools -- Data and research initiatives for cybersecurity analysis. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
41311 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Big data. |
9 (RLIN) |
41312 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Database security. |
9 (RLIN) |
41313 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
41314 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information technology |
General subdivision |
Management. |
9 (RLIN) |
41315 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Savas, Onur, |
Relator term |
editor. |
9 (RLIN) |
41316 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Deng, Julia, |
Relator term |
editor. |
9 (RLIN) |
41317 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |