Big Data Analytics in Cybersecurity
Onur (Intelligent Automation Savas
Sold by AHA-BUCH GmbH, Einbeck, Germany
AbeBooks Seller since 14 August 2006
New - Soft cover
Condition: New
Quantity: 2 available
Add to basketSold by AHA-BUCH GmbH, Einbeck, Germany
AbeBooks Seller since 14 August 2006
Condition: New
Quantity: 2 available
Add to basketNeuware - This book gives a comprehensive coverage of state-of-the-art big data analytics in cybersecurity and IT management. The topics include threat analysis, vulnerability identification, mission analysis, network monitoring, network management, visualization, and cybertraining. Each topic is examined in detail in a case study.
Seller Inventory # 9781032096360
Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, offers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators.
Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes.
Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include:
In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined.
The book first focuses on how big data analytics can be used in different aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.
Dr. Onur Savas is a data scientist at Intelligent Automation, Inc. (IAI), Rockville, MD. As a data scientist, he performs research and development (R&D), leads a team of data scientists, software engineers, and programmers, and contributes to IAI’s increasing portfolio of products. He has more than 10 years of R&D expertise in the areas of networks and security, social media, distributed algorithms, sensors, and statistics. His recent work focuses on all aspects of big data analytics and cloud computing with applications to network management, cybersecurity, and social networks. Dr. Savas has a PhD in electrical and computer engineering from Boston University, Boston, MA, and is the author of numerous publications in leading journals and conferences. At IAI, he has been the recipient of various R&D contracts from DARPA, ONR, ARL, AFRL, CTTSO, NASA, and other federal agencies. His work at IAI has contributed to the development and commercialization of IAI’s social media analytics tool Scraawl® (www.scraawl.com).
Dr. Julia Deng is a principal scientist and Sr. Director of Network and Security Group at Intelligent Automation, Inc. (IAI), Rockville, MD. She leads a team of more than 40 scientists and engineers, and during her tenure at IAI, she has been instrumental in growing IAI’s research portfolio in networks and cybersecurity. In her role as a principal investigator and principal scientist, she initiated and directed numerous R&D programs in the areas of airborne networks, cybersecurity, network management, wireless networks, trusted computing, embedded system, cognitive radio networks, big data analytics, and cloud computing. Dr. Deng has a PhD from the University of Cincinnati, Cincinnati, OH, and has published over 30 papers in leading international journals and conference proceedings.
"About this title" may belong to another edition of this title.
General Terms and Conditions and Customer Information / Privacy Policy
I. General Terms and Conditions
§ 1 Basic provisions
(1) The following terms and conditions apply to all contracts that you conclude with us as a provider (AHA-BUCH GmbH) via the Internet platforms AbeBooks and/or ZVAB. Unless otherwise agreed, the inclusion of any of your own terms and conditions used by you will be objected to
(2) A consumer within the meaning of the following regulations is any natural person who concludes...
We ship your order after we received them
for articles on hand latest 24 hours,
for articles with overnight supply latest 48 hours.
In case we need to order an article from our supplier our dispatch time depends on the reception date of the articles, but the articles will be shipped on the same day.
Our goal is to send the ordered articles in the fastest, but also most efficient and secure way to our customers.
| Order quantity | 30 to 40 business days | 7 to 14 business days |
|---|---|---|
| First item | £ 54.99 | £ 63.73 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.