Big data analytics with applications in insider threat detection / (Record no. 39370)

MARC details
000 -LEADER
fixed length control field 01618cam a22003258i 4500
001 - CONTROL NUMBER
control field 19876736
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210310155534.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170809s2018 flu b 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2017037808
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781498705479 (hb : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number P384 2017
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 THU-B
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Thuraisingham, Bhavani
Relator term author.
245 10 - TITLE STATEMENT
Title Big data analytics with applications in insider threat detection /
Statement of responsibility, etc. Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Boca Raton
Name of publisher, distributor, etc. CRC Press
Date of publication, distribution, etc. 2018
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 1801
300 ## - PHYSICAL DESCRIPTION
Extent 543 p.
365 ## - TRADE PRICE
Price type code GBP
Price amount 88.85
500 ## - GENERAL NOTE
General note Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Data processing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Malware (Computer software)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Big data.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Investigation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Access control.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
955 ## - COPY-LEVEL INFORMATION (RLIN)
Book number/undivided call number, CCAL (RLIN) rk09 2017-08-09
Copy status, CST (RLIN) rk09 2017-08-09
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
Withdrawn status
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     003-007 BITS Pilani Hyderabad BITS Pilani Hyderabad General Stack (For lending) 29/03/2019   005.8 THU-B 37523 13/07/2024 29/03/2019 Books
An institution deemed to be a University Estd. Vide Sec.3 of the UGC
Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

© 2024 BITS-Library, BITS-Hyderabad, India.