Threat forecasting: leveraging big data for predictive analysis
This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, MA
Syngress is an imprint of Elsevier
2016
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools |
Beschreibung: | Includes index Includes bibliographical references and index |
Beschreibung: | 1 online resource |
ISBN: | 9780128004784 0128004789 0128000066 9780128000069 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046127001 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2016 |||| o||u| ||||||eng d | ||
020 | |a 9780128004784 |9 978-0-12-800478-4 | ||
020 | |a 0128004789 |9 0-12-800478-9 | ||
020 | |a 0128000066 |9 0-12-800006-6 | ||
020 | |a 9780128000069 |9 978-0-12-800006-9 | ||
024 | 3 | |a 9780128000069 | |
035 | |a (ZDB-33-ESD)ocn950518678 | ||
035 | |a (OCoLC)950518678 | ||
035 | |a (DE-599)BVBBV046127001 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Threat forecasting |b leveraging big data for predictive analysis |c John Pirc, David DeSanto, Iain Davison, Will Gragido |
264 | 1 | |a Cambridge, MA |b Syngress is an imprint of Elsevier |c 2016 | |
264 | 4 | |c © 2016 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references and index | ||
520 | |a This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools | ||
650 | 7 | |a COMPUTERS / Security / Networking |2 bisacsh | |
650 | 7 | |a Big data |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Big data | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bedrohung |0 (DE-588)4144266-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Big Data |0 (DE-588)4802620-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prognose |0 (DE-588)4047390-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Big Data |0 (DE-588)4802620-7 |D s |
689 | 0 | 2 | |a Bedrohung |0 (DE-588)4144266-0 |D s |
689 | 0 | 3 | |a Prognose |0 (DE-588)4047390-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Pirc, John |e Sonstige |4 oth | |
700 | 1 | |a DeSanto, David |4 aut | |
700 | 1 | |a Davison, Iain |4 aut | |
700 | 1 | |a Gragido, Will |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128000069 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128000069 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031507455 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128000069 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180447689703424 |
---|---|
any_adam_object | |
author | DeSanto, David Davison, Iain Gragido, Will |
author_facet | DeSanto, David Davison, Iain Gragido, Will |
author_role | aut aut aut |
author_sort | DeSanto, David |
author_variant | d d dd i d id w g wg |
building | Verbundindex |
bvnumber | BV046127001 |
classification_rvk | ST 276 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn950518678 (OCoLC)950518678 (DE-599)BVBBV046127001 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02640nmm a2200637zc 4500</leader><controlfield tag="001">BV046127001</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128004784</subfield><subfield code="9">978-0-12-800478-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128004789</subfield><subfield code="9">0-12-800478-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128000066</subfield><subfield code="9">0-12-800006-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128000069</subfield><subfield code="9">978-0-12-800006-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780128000069</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn950518678</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)950518678</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046127001</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat forecasting</subfield><subfield code="b">leveraging big data for predictive analysis</subfield><subfield code="c">John Pirc, David DeSanto, Iain Davison, Will Gragido</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress is an imprint of Elsevier</subfield><subfield code="c">2016</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Big data</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bedrohung</subfield><subfield code="0">(DE-588)4144266-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prognose</subfield><subfield code="0">(DE-588)4047390-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Bedrohung</subfield><subfield code="0">(DE-588)4144266-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Prognose</subfield><subfield code="0">(DE-588)4047390-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pirc, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">DeSanto, David</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Davison, Iain</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gragido, Will</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128000069</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128000069</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507455</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128000069</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046127001 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:55Z |
institution | BVB |
isbn | 9780128004784 0128004789 0128000066 9780128000069 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507455 |
oclc_num | 950518678 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Syngress is an imprint of Elsevier |
record_format | marc |
spelling | Threat forecasting leveraging big data for predictive analysis John Pirc, David DeSanto, Iain Davison, Will Gragido Cambridge, MA Syngress is an imprint of Elsevier 2016 © 2016 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references and index This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools COMPUTERS / Security / Networking bisacsh Big data fast Computer security fast Computer security Big data Computersicherheit (DE-588)4274324-2 gnd rswk-swf Bedrohung (DE-588)4144266-0 gnd rswk-swf Big Data (DE-588)4802620-7 gnd rswk-swf Prognose (DE-588)4047390-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Big Data (DE-588)4802620-7 s Bedrohung (DE-588)4144266-0 s Prognose (DE-588)4047390-9 s 1\p DE-604 Pirc, John Sonstige oth DeSanto, David aut Davison, Iain aut Gragido, Will aut Erscheint auch als Druck-Ausgabe 9780128000069 http://www.sciencedirect.com/science/book/9780128000069 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | DeSanto, David Davison, Iain Gragido, Will Threat forecasting leveraging big data for predictive analysis COMPUTERS / Security / Networking bisacsh Big data fast Computer security fast Computer security Big data Computersicherheit (DE-588)4274324-2 gnd Bedrohung (DE-588)4144266-0 gnd Big Data (DE-588)4802620-7 gnd Prognose (DE-588)4047390-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4144266-0 (DE-588)4802620-7 (DE-588)4047390-9 |
title | Threat forecasting leveraging big data for predictive analysis |
title_auth | Threat forecasting leveraging big data for predictive analysis |
title_exact_search | Threat forecasting leveraging big data for predictive analysis |
title_full | Threat forecasting leveraging big data for predictive analysis John Pirc, David DeSanto, Iain Davison, Will Gragido |
title_fullStr | Threat forecasting leveraging big data for predictive analysis John Pirc, David DeSanto, Iain Davison, Will Gragido |
title_full_unstemmed | Threat forecasting leveraging big data for predictive analysis John Pirc, David DeSanto, Iain Davison, Will Gragido |
title_short | Threat forecasting |
title_sort | threat forecasting leveraging big data for predictive analysis |
title_sub | leveraging big data for predictive analysis |
topic | COMPUTERS / Security / Networking bisacsh Big data fast Computer security fast Computer security Big data Computersicherheit (DE-588)4274324-2 gnd Bedrohung (DE-588)4144266-0 gnd Big Data (DE-588)4802620-7 gnd Prognose (DE-588)4047390-9 gnd |
topic_facet | COMPUTERS / Security / Networking Big data Computer security Computersicherheit Bedrohung Big Data Prognose |
url | http://www.sciencedirect.com/science/book/9780128000069 |
work_keys_str_mv | AT pircjohn threatforecastingleveragingbigdataforpredictiveanalysis AT desantodavid threatforecastingleveragingbigdataforpredictiveanalysis AT davisoniain threatforecastingleveragingbigdataforpredictiveanalysis AT gragidowill threatforecastingleveragingbigdataforpredictiveanalysis |