Data mining tools for malware detection / Mehedy Masud, Latifur Khan, and Bhavani Thuraisingham.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2012
Language:English
Online Access:
Physical Description:xxx, 402 p. :; ill.
Notes:"An Auerbach book."
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01812nam a2200421 a 4500
001 500826949
003 MiAaPQ
005 20200520144314.0
006 m o d |
007 cr cn|||||||||
008 111019s2012 fluad sb 000 0 eng d
010 |z  2011039383 
020 |z 9781439854549 (hardcover alk. paper) 
020 |a 9781439854556 (electronic bk.) 
035 |a (MiAaPQ)500826949 
035 |a (Au-PeEL)EBL826949 
035 |a (CaPaEBR)ebr10518021 
035 |a (CaONFJC)MIL390877 
035 |a (OCoLC)772458526 
040 |a MiAaPQ  |c MiAaPQ  |d MiAaPQ 
050 4 |a QA76.9.D343  |b M385 2012 
082 0 4 |a 005.8  |2 23 
100 1 |a Masud, Mehedy. 
245 1 0 |a Data mining tools for malware detection  |h [electronic resource] /  |c Mehedy Masud, Latifur Khan, and Bhavani Thuraisingham. 
260 |a Boca Raton, Fla. :  |b CRC Press,  |c 2012. 
300 |a xxx, 402 p. :  |b ill. 
500 |a "An Auerbach book." 
504 |a Includes bibliographical references. 
505 0 |a pt. 1. Data mining and security -- pt. 2. Data mining for email worm detection -- pt. 3. Data mining for detecting malicious executables -- pt. 4. Data mining for detecting remote exploits -- pt. 5. Data mining for detecting botnets -- pt. 6. Stream mining for security applications -- pt. 7. Emerging applications. 
533 |a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. 
650 0 |a Data mining. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
655 4 |a Electronic books. 
700 1 |a Khan, Latifur. 
700 1 |a Thuraisingham, Bhavani M. 
710 2 |a ProQuest (Firm) 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=826949  |z Click to View