Big data analytics with applications in insider threat detection / (Record no. 39370)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01618cam a22003258i 4500 |
001 - CONTROL NUMBER | |
control field | 19876736 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20210310155534.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 170809s2018 flu b 000 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2017037808 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781498705479 (hb : alk. paper) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | DLC |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | P384 2017 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 THU-B |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Thuraisingham, Bhavani |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Big data analytics with applications in insider threat detection / |
Statement of responsibility, etc. | Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Boca Raton |
Name of publisher, distributor, etc. | CRC Press |
Date of publication, distribution, etc. | 2018 |
263 ## - PROJECTED PUBLICATION DATE | |
Projected publication date | 1801 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 543 p. |
365 ## - TRADE PRICE | |
Price type code | GBP |
Price amount | 88.85 |
500 ## - GENERAL NOTE | |
General note | Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
General subdivision | Data processing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Malware (Computer software) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Big data. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes |
General subdivision | Investigation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Access control. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
a | 7 |
b | cbc |
c | orignew |
d | 1 |
e | ecip |
f | 20 |
g | y-gencatlg |
955 ## - COPY-LEVEL INFORMATION (RLIN) | |
Book number/undivided call number, CCAL (RLIN) | rk09 2017-08-09 |
Copy status, CST (RLIN) | rk09 2017-08-09 |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) | |
Withdrawn status |
Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | 003-007 | BITS Pilani Hyderabad | BITS Pilani Hyderabad | General Stack (For lending) | 29/03/2019 | 005.8 THU-B | 37523 | 13/07/2024 | 29/03/2019 | Books |