
Library Catalogue

| 000 -LEADER | |
|---|---|
| fixed length control field | 01812nam a2200217Ia 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20210405101755.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 160316s2014 xxu||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781783263745 |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | n |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 343.099450 |
| Item number | ADA |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Adams Niall |
| 245 ## - TITLE STATEMENT | |
| Title | Data analysis for network cyber-security |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | London |
| Name of publisher, distributor, etc. | Imperial College Press |
| Date of publication, distribution, etc. | 2014 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 189p |
| Dimensions | v |
| 365 ## - TRADE PRICE | |
| Price amount | Rs. 5,895 |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Summary: <br/>There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data analysis for network cyber-security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | 1. Computer Networks - Security Measures - Congresses |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Heard Nicholas |
| -- | |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | BOOKs |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| . | . | 30.05.2017 | 5895.00 | 343.09945 ADA | 31431 | 30.05.2017 | 30.05.2017 | BOOKs |