Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
Advances in Information Security

Data Warehousing and Data Mining Techniques for Cyber Security

    • USD 129.99
    • USD 129.99

Descripción editorial

Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend--without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important.

Data Warehousing and Data Mining Techniques for Cyber Security contributes to the discipline of security informatics. The author discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. Since the cost of information processing and internet accessibility is dropping, an increasing number of organizations are becoming vulnerable to cyber attacks. This volume introduces techniques for applications in the area of retail, finance, and bioinformatics, to name a few.

Data Warehousing and Data Mining Techniques for Cyber Security is designed for practitioners and researchers in industry. This book is also suitable for upper-undergraduate and graduate-level students in computer science.

GÉNERO
Informática e Internet
PUBLICADO
2007
6 de abril
IDIOMA
EN
Inglés
EXTENSIÓN
173
Páginas
EDITORIAL
Springer US
VENDEDOR
Springer Nature B.V.
TAMAÑO
1.3
MB
Data and Applications Security and Privacy XXXIV Data and Applications Security and Privacy XXXIV
2020
Network Security Metrics Network Security Metrics
2017
Secure Cloud Computing Secure Cloud Computing
2014
Quantitative Security Risk Assessment of Enterprise Networks Quantitative Security Risk Assessment of Enterprise Networks
2011
Preserving Privacy in On-Line Analytical Processing (OLAP) Preserving Privacy in On-Line Analytical Processing (OLAP)
2007
Network Security Policies and Procedures Network Security Policies and Procedures
2007
Secure Data Management in Decentralized Systems Secure Data Management in Decentralized Systems
2007
Synchronizing Internet Protocol Security (SIPSec) Synchronizing Internet Protocol Security (SIPSec)
2007
Privacy-Respecting Intrusion Detection Privacy-Respecting Intrusion Detection
2007
Botnet Detection Botnet Detection
2007