Data mining tools for malware detection:
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Auerbach Publications
2016
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781439854556/?ar |
Zusammenfassung: | Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware d. |
Umfang: | 1 Online-Ressource (450 Seiten) 29 illustrations |
ISBN: | 9781439854556 1439854556 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-061576026 | ||
003 | DE-627-1 | ||
005 | 20240228120306.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210216s2016 xx |||||o 00| ||eng c | ||
020 | |a 9781439854556 |c PDF |9 978-1-4398-5455-6 | ||
020 | |a 1439854556 |c PDF |9 1-4398-5455-6 | ||
035 | |a (DE-627-1)061576026 | ||
035 | |a (DE-599)KEP061576026 | ||
035 | |a (ORHE)9781439854556 | ||
035 | |a (DE-627-1)061576026 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230216 | |
100 | 1 | |a Masud, Mehedy |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Data mining tools for malware detection |c Mehedy Masud, Latifur Khan, Bhavani Thuraisingham |
250 | |a First edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Auerbach Publications |c 2016 | |
300 | |a 1 Online-Ressource (450 Seiten) |b 29 illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware d. | ||
650 | 0 | |a Data mining | |
650 | 0 | |a Malware (Computer software) | |
650 | 2 | |a Data Mining | |
650 | 4 | |a Exploration de données (Informatique) | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a Data mining | |
650 | 4 | |a Malware (Computer software) | |
700 | 1 | |a Khan, Latifur |e VerfasserIn |4 aut | |
700 | 1 | |a Thuraisingham, Bhavani M. |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781439854556/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-061576026 |
---|---|
_version_ | 1821494834702057472 |
adam_text | |
any_adam_object | |
author | Masud, Mehedy Khan, Latifur Thuraisingham, Bhavani M. |
author_facet | Masud, Mehedy Khan, Latifur Thuraisingham, Bhavani M. |
author_role | aut aut aut |
author_sort | Masud, Mehedy |
author_variant | m m mm l k lk b m t bm bmt |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)061576026 (DE-599)KEP061576026 (ORHE)9781439854556 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01919cam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-061576026</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120306.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210216s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439854556</subfield><subfield code="c">PDF</subfield><subfield code="9">978-1-4398-5455-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439854556</subfield><subfield code="c">PDF</subfield><subfield code="9">1-4398-5455-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)061576026</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP061576026</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781439854556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)061576026</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Masud, Mehedy</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data mining tools for malware detection</subfield><subfield code="c">Mehedy Masud, Latifur Khan, Bhavani Thuraisingham</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Auerbach Publications</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (450 Seiten)</subfield><subfield code="b">29 illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware d.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Data Mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Exploration de données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Latifur</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thuraisingham, Bhavani M.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781439854556/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-061576026 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:41Z |
institution | BVB |
isbn | 9781439854556 1439854556 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (450 Seiten) 29 illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Auerbach Publications |
record_format | marc |
spelling | Masud, Mehedy VerfasserIn aut Data mining tools for malware detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham First edition. [Erscheinungsort nicht ermittelbar] Auerbach Publications 2016 1 Online-Ressource (450 Seiten) 29 illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware d. Data mining Malware (Computer software) Data Mining Exploration de données (Informatique) Logiciels malveillants Khan, Latifur VerfasserIn aut Thuraisingham, Bhavani M. VerfasserIn aut |
spellingShingle | Masud, Mehedy Khan, Latifur Thuraisingham, Bhavani M. Data mining tools for malware detection Data mining Malware (Computer software) Data Mining Exploration de données (Informatique) Logiciels malveillants |
title | Data mining tools for malware detection |
title_auth | Data mining tools for malware detection |
title_exact_search | Data mining tools for malware detection |
title_full | Data mining tools for malware detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham |
title_fullStr | Data mining tools for malware detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham |
title_full_unstemmed | Data mining tools for malware detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham |
title_short | Data mining tools for malware detection |
title_sort | data mining tools for malware detection |
topic | Data mining Malware (Computer software) Data Mining Exploration de données (Informatique) Logiciels malveillants |
topic_facet | Data mining Malware (Computer software) Data Mining Exploration de données (Informatique) Logiciels malveillants |
work_keys_str_mv | AT masudmehedy dataminingtoolsformalwaredetection AT khanlatifur dataminingtoolsformalwaredetection AT thuraisinghambhavanim dataminingtoolsformalwaredetection |