Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200493 i 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr unu|||||||| 
008    190114s2018    caua    ob    000 0 eng d 
029 1  AU@|b000069004313 
035    (OCoLC)1082143718 
037    CL0501000017|bSafari Books Online 
040    UMI|beng|erda|epn|cUMI|dG3B|dSTF|dMERER|dOCLCF|dOCLCQ|dCZL
       |dOCLCQ|dOCLCO|dOCLCQ|dOCLCO 
049    INap 
099    eBook O'Reilly for Public Libraries 
100 1  Guerra, Peter,|eauthor. 
245 10 Modernizing cybersecurity operations with machine 
       intelligence :|badvanced threat detection, hunting, and 
       analysis /|cPeter Guerra and Paul Tamburello.|h[O'Reilly 
       electronic resource] 
250    First edition. 
264  1 Sebastopol, CA :|bO'Reilly Media,|c[2018] 
264  4 |c©2018 
300    1 online resource (1 volume) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references. 
520    Adversaries and hackers have gained significant and 
       distinct advantages in cyber warfare today. Creative, fast,
       and opportunistic attackers have created an ecosystem of 
       advanced persistent threats that is growing in scale and 
       complexity, and evolving more rapidly than our 
       capabilities to respond. By integrating machine 
       intelligence (MI), you can significantly modernize your 
       organization's security operations to better keep pace 
       with these threats. With this ebook, Peter Guerra and Paul
       Tamburello--chief executives at Booz Allen Hamilton--
       provide examples to show you how MI can change 
       cybersecurity operations to be more effective and 
       efficient in threat detection, monitoring, and risk 
       analysis. Applying MI to automate cybersecurity processes 
       will enable swifter and more accurate identification of 
       new and emerging threats in this continually changing 
       landscape. Attacks are only likely to increase in size and
       frequency across companies, institutions, and government 
       agencies. This ebook demonstrates a powerful tool that can
       help you level the playing field. You will learn: The 
       scope of the existing threat landscape, and benefits of 
       applying MI to cybersecurity What machine intelligence can
       and cannot do when applied to cybersecurity Specific 
       security applications of machine intelligence in the real 
       world How to address your organization's maturity and 
       readiness for cybersecurity with MI The first steps for 
       moving ahead with MI security in your organization How to 
       overcome difficulties and challenges when adopting machine
       intelligence. 
588 0  Online resource; title from title page (Safari, viewed 
       January 9, 2019). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer networks|xSecurity measures. 
650  0 Machine learning. 
650  0 Computer crimes|xPrevention. 
650  0 Information technology|xManagement. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures. 
650  6 Apprentissage automatique. 
650  6 Technologie de l'information|xGestion. 
650  7 Computer crimes|xPrevention|2fast 
650  7 Computer networks|xSecurity measures|2fast 
650  7 Information technology|xManagement|2fast 
650  7 Machine learning|2fast 
700 1  Tamburello, Paul,|eauthor. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781492035992/?ar
       |zAvailable on O'Reilly for Public Libraries 
994    92|bJFN