Big data analytics in cybersecurity / edited by Onur Savas, Julia Deng.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781498772129 (hardback : acid-free paper)
- 1498772129 (hardback : acid-free paper)
- QA76.9.A25 B538 2017
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 B538 2017 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000052115 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 B538 2017 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30020000052116 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
QA76.9.A25 B48 2000 Best truth : intelligence in the Information Age / | QA76.9.A25 B48 2000 Best truth : intelligence in the Information Age / | QA76.9.A25 B48 2000 Best truth : intelligence in the Information Age / | QA76.9.A25 B538 2017 Big data analytics in cybersecurity / | QA76.9.A25 B538 2017 Big data analytics in cybersecurity / | QA76.9.A25 B696 2004 Understanding the insider threat : proceedings of a March 2004 workshop / | QA76.9.A25 B824 2011 Introduction to security and network forensics / |
"An Auerbach book."
Includes bibliographical references and index.
The power of big data in cybersecurity -- Big data analytics for network forensics -- Dynamic analytics-driven assessment of vulnerabilities and exploitation -- Big data analytics for mobile app security -- Machine unlearning: repairing learning models in adversarial -- Environments -- Cybersecurity training -- Machine unlearning: repairing learning models in adversarial environments -- Big data analytics for mobile app security -- Security, privacy and trust in cloud computing: challenges and solutions -- Cybersecurity in internet of things (IOT) -- Data visualization for cyber security -- Analyzing deviant socio-technical behaviors using social network analysis and cyber forensics-based methodologies -- Security tools -- Data and research initiatives for cybersecurity analysis.