Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/768
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Thuraisingham, Bhavani M., ; author ; | en_US |
dc.contributor.author | Masud, Mehedy, ; author ; | en_US |
dc.contributor.author | Parveen, Pallabi, ; author ; | en_US |
dc.contributor.author | Khan, Latifur, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:21:50Z | - |
dc.date.available | 2020-05-17T08:21:50Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9781498705479 ; | en_US |
dc.identifier.isbn | 9781351645768 ; | en_US |
dc.identifier.isbn | 1351645765 ; | en_US |
dc.identifier.isbn | 9781498705486 ; | en_US |
dc.identifier.isbn | 9781315119458 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/768 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan | en_US |
dc.format.extent | 1 online resource (1 volume) : ; illustrations ; | en_US |
dc.format.extent | Includes bibliographical references and index ; | en_US |
dc.publisher | CRC Press, | en_US |
dc.relation.haspart | 9781498705479.pdf | en_US |
dc.subject | Computer security ; Data processing ; | en_US |
dc.subject | Malware (Computer software) ; | en_US |
dc.subject | Big data ; | en_US |
dc.subject | Computer crimes ; Investigation ; | en_US |
dc.subject | Computer networks ; Access control ; | en_US |
dc.title | Big data analytics with applications in insider threat detection / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Boca Raton, FL : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781498705479.pdf | 76.73 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Thuraisingham, Bhavani M., ; author ; | en_US |
dc.contributor.author | Masud, Mehedy, ; author ; | en_US |
dc.contributor.author | Parveen, Pallabi, ; author ; | en_US |
dc.contributor.author | Khan, Latifur, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:21:50Z | - |
dc.date.available | 2020-05-17T08:21:50Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9781498705479 ; | en_US |
dc.identifier.isbn | 9781351645768 ; | en_US |
dc.identifier.isbn | 1351645765 ; | en_US |
dc.identifier.isbn | 9781498705486 ; | en_US |
dc.identifier.isbn | 9781315119458 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/768 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan | en_US |
dc.format.extent | 1 online resource (1 volume) : ; illustrations ; | en_US |
dc.format.extent | Includes bibliographical references and index ; | en_US |
dc.publisher | CRC Press, | en_US |
dc.relation.haspart | 9781498705479.pdf | en_US |
dc.subject | Computer security ; Data processing ; | en_US |
dc.subject | Malware (Computer software) ; | en_US |
dc.subject | Big data ; | en_US |
dc.subject | Computer crimes ; Investigation ; | en_US |
dc.subject | Computer networks ; Access control ; | en_US |
dc.title | Big data analytics with applications in insider threat detection / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Boca Raton, FL : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781498705479.pdf | 76.73 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Thuraisingham, Bhavani M., ; author ; | en_US |
dc.contributor.author | Masud, Mehedy, ; author ; | en_US |
dc.contributor.author | Parveen, Pallabi, ; author ; | en_US |
dc.contributor.author | Khan, Latifur, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:21:50Z | - |
dc.date.available | 2020-05-17T08:21:50Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9781498705479 ; | en_US |
dc.identifier.isbn | 9781351645768 ; | en_US |
dc.identifier.isbn | 1351645765 ; | en_US |
dc.identifier.isbn | 9781498705486 ; | en_US |
dc.identifier.isbn | 9781315119458 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/768 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan | en_US |
dc.format.extent | 1 online resource (1 volume) : ; illustrations ; | en_US |
dc.format.extent | Includes bibliographical references and index ; | en_US |
dc.publisher | CRC Press, | en_US |
dc.relation.haspart | 9781498705479.pdf | en_US |
dc.subject | Computer security ; Data processing ; | en_US |
dc.subject | Malware (Computer software) ; | en_US |
dc.subject | Big data ; | en_US |
dc.subject | Computer crimes ; Investigation ; | en_US |
dc.subject | Computer networks ; Access control ; | en_US |
dc.title | Big data analytics with applications in insider threat detection / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Boca Raton, FL : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781498705479.pdf | 76.73 MB | Adobe PDF | Preview File |