Data-driven security : (Record no. 11451)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01661nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520100703.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118793725 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA 76.9.A25 .J33 2014 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Jacobs, Jay |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Data-driven security : |
Remainder of title | analysis, visualization and dashboards / |
Statement of responsibility, etc. | Jay Jacobs and Bob Rudis |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Indiana : |
Name of publisher, distributor, etc. | Wiley, |
Date of publication, distribution, etc. | c2014 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xix, 331 pages : |
Other physical details | illustrations ; |
Dimensions | 23 cm. |
365 ## - TRADE PRICE | |
Price amount | USD484.04 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1. The Journey to data-driven security -- Chapter 2. Building your analytics toolbox : a primer on using R and python for security analysis -- Chapter 3. learning the "hello world" of security data analysis -- Chapter 4. Performing exploratory security data analysis -- Chapter 5. From maps to regression -- Chapter 6. Visualizing security data -- chapter 7. Learning from security breaches -- Chapter 8 . Breaking up with your relational database -- Chapter 9. Demystifying machine learning -- Chapter 10. Designing effective security dashboards -- Chapter 11. Building interactive security visualizations -- Chapter 12. Moving toward data-driven security. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data analysis and visualization. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER SECURITY |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Rudis, Bob |
Relator term | co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Gen. Ed. - CCIT | LRC - Graduate Studies | National University - Manila | General Circulation | 03/24/2015 | Purchased - Amazon | 484.04 | GC QA 76.9.A25 .J33 2014 | NULIB000009210 | 05/20/2025 | c.1 | 05/20/2025 | Books |