Applications of Data Mining in Computer Security

·
· Advances in Information Security Llibre 6 · Springer Science & Business Media
5,0
1 ressenya
Llibre electrònic
252
Pàgines

Sobre aquest llibre

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security.

Data mining has been loosely defined as the process of extracting information from large amounts of data. In the context of security, the information we are seeking is the knowledge of whether a security breach has been experienced, and if the answer is yes, who is the perpetrator. This information could be collected in the context of discovering intrusions that aim to breach the privacy of services, data in a computer system or alternatively, in the context of discovering evidence left in a computer system as part of criminal activity.

Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence.

Applications Of Data Mining In Computer Security is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate level students in computer science.

Puntuacions i ressenyes

5,0
1 ressenya

Sobre l'autor

Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA

Puntua aquest llibre electrònic

Dona'ns la teva opinió.

Informació de lectura

Telèfons intel·ligents i tauletes
Instal·la l'aplicació Google Play Llibres per a Android i per a iPad i iPhone. Aquesta aplicació se sincronitza automàticament amb el compte i et permet llegir llibres en línia o sense connexió a qualsevol lloc.
Ordinadors portàtils i ordinadors de taula
Pots escoltar els audiollibres que has comprat a Google Play amb el navegador web de l'ordinador.
Lectors de llibres electrònics i altres dispositius
Per llegir en dispositius de tinta electrònica, com ara lectors de llibres electrònics Kobo, hauràs de baixar un fitxer i transferir-lo al dispositiu. Segueix les instruccions detallades del Centre d'ajuda per transferir els fitxers a lectors de llibres electrònics compatibles.

Continua la sèrie

Més d'aquest autor: Daniel Barbará

Llibres electrònics similars