Big data analytics with applications in insider threat detection:
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to...
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
[2018]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781351645768/?ar |
Zusammenfassung: | Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection. |
Beschreibung: | Includes bibliographical references and index. - Online resource; title from title page (viewed February 1, 2018) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781351645768 1351645765 1498705472 9781498705479 1498705480 9781498705486 1315119455 9781315119458 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047565756 | ||
003 | DE-627-1 | ||
005 | 20240228120426.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781351645768 |9 978-1-351-64576-8 | ||
020 | |a 1351645765 |9 1-351-64576-5 | ||
020 | |a 1498705472 |9 1-4987-0547-2 | ||
020 | |a 9781498705479 |9 978-1-4987-0547-9 | ||
020 | |a 1498705480 |9 1-4987-0548-0 | ||
020 | |a 9781498705486 |9 978-1-4987-0548-6 | ||
020 | |a 1315119455 |9 1-315-11945-5 | ||
020 | |a 9781315119458 |9 978-1-315-11945-8 | ||
035 | |a (DE-627-1)047565756 | ||
035 | |a (DE-599)KEP047565756 | ||
035 | |a (ORHE)9781351645768 | ||
035 | |a (DE-627-1)047565756 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Thuraisingham, Bhavani M. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Big data analytics with applications in insider threat detection |c Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan |
264 | 1 | |a Boca Raton, FL |b CRC Press |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from title page (viewed February 1, 2018) | ||
520 | |a Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection. | ||
650 | 0 | |a Computer security |x Data processing | |
650 | 0 | |a Malware (Computer software) | |
650 | 0 | |a Big data | |
650 | 0 | |a Computer crimes |x Investigation | |
650 | 0 | |a Computer networks |x Access control | |
650 | 4 | |a Sécurité informatique ; Informatique | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a Données volumineuses | |
650 | 4 | |a Criminalité informatique ; Enquêtes | |
650 | 4 | |a Big data | |
650 | 4 | |a Computer crimes ; Investigation | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Malware (Computer software) | |
700 | 1 | |a Masud, Mehedy |e VerfasserIn |4 aut | |
700 | 1 | |a Parveen, Pallabi |e VerfasserIn |4 aut | |
700 | 1 | |a Khan, Latifur |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781351645768/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047565756 |
---|---|
_version_ | 1821494880837304320 |
adam_text | |
any_adam_object | |
author | Thuraisingham, Bhavani M. Masud, Mehedy Parveen, Pallabi Khan, Latifur |
author_facet | Thuraisingham, Bhavani M. Masud, Mehedy Parveen, Pallabi Khan, Latifur |
author_role | aut aut aut aut |
author_sort | Thuraisingham, Bhavani M. |
author_variant | b m t bm bmt m m mm p p pp l k lk |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047565756 (DE-599)KEP047565756 (ORHE)9781351645768 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02852cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-047565756</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120426.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781351645768</subfield><subfield code="9">978-1-351-64576-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1351645765</subfield><subfield code="9">1-351-64576-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1498705472</subfield><subfield code="9">1-4987-0547-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781498705479</subfield><subfield code="9">978-1-4987-0547-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1498705480</subfield><subfield code="9">1-4987-0548-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781498705486</subfield><subfield code="9">978-1-4987-0548-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1315119455</subfield><subfield code="9">1-315-11945-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781315119458</subfield><subfield code="9">978-1-315-11945-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047565756</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047565756</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781351645768</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047565756</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thuraisingham, Bhavani M.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Big data analytics with applications in insider threat detection</subfield><subfield code="c">Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (viewed February 1, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Données volumineuses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Masud, Mehedy</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Parveen, Pallabi</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Latifur</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781351645768/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047565756 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:25Z |
institution | BVB |
isbn | 9781351645768 1351645765 1498705472 9781498705479 1498705480 9781498705486 1315119455 9781315119458 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | CRC Press |
record_format | marc |
spelling | Thuraisingham, Bhavani M. VerfasserIn aut Big data analytics with applications in insider threat detection Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan Boca Raton, FL CRC Press [2018] ©2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from title page (viewed February 1, 2018) Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection. Computer security Data processing Malware (Computer software) Big data Computer crimes Investigation Computer networks Access control Sécurité informatique ; Informatique Logiciels malveillants Données volumineuses Criminalité informatique ; Enquêtes Computer crimes ; Investigation Computer networks ; Access control Masud, Mehedy VerfasserIn aut Parveen, Pallabi VerfasserIn aut Khan, Latifur VerfasserIn aut |
spellingShingle | Thuraisingham, Bhavani M. Masud, Mehedy Parveen, Pallabi Khan, Latifur Big data analytics with applications in insider threat detection Computer security Data processing Malware (Computer software) Big data Computer crimes Investigation Computer networks Access control Sécurité informatique ; Informatique Logiciels malveillants Données volumineuses Criminalité informatique ; Enquêtes Computer crimes ; Investigation Computer networks ; Access control |
title | Big data analytics with applications in insider threat detection |
title_auth | Big data analytics with applications in insider threat detection |
title_exact_search | Big data analytics with applications in insider threat detection |
title_full | Big data analytics with applications in insider threat detection Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan |
title_fullStr | Big data analytics with applications in insider threat detection Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan |
title_full_unstemmed | Big data analytics with applications in insider threat detection Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan |
title_short | Big data analytics with applications in insider threat detection |
title_sort | big data analytics with applications in insider threat detection |
topic | Computer security Data processing Malware (Computer software) Big data Computer crimes Investigation Computer networks Access control Sécurité informatique ; Informatique Logiciels malveillants Données volumineuses Criminalité informatique ; Enquêtes Computer crimes ; Investigation Computer networks ; Access control |
topic_facet | Computer security Data processing Malware (Computer software) Big data Computer crimes Investigation Computer networks Access control Sécurité informatique ; Informatique Logiciels malveillants Données volumineuses Criminalité informatique ; Enquêtes Computer crimes ; Investigation Computer networks ; Access control |
work_keys_str_mv | AT thuraisinghambhavanim bigdataanalyticswithapplicationsininsiderthreatdetection AT masudmehedy bigdataanalyticswithapplicationsininsiderthreatdetection AT parveenpallabi bigdataanalyticswithapplicationsininsiderthreatdetection AT khanlatifur bigdataanalyticswithapplicationsininsiderthreatdetection |