It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 08174cam 2200997Ii 4500
001 ocn932289267
003 OCoLC
005 20220715150443.0
008 151216s2015 cau o 000 0 eng d
006 m o d
007 cr cnu---unuuu
010 $a 2016439417
040 $aN$T$beng$erda$epn$cN$T$dIDEBK$dYDXCP$dTEFOD$dN$T$dUMI$dCDX$dDEBSZ$dEBLCP$dDEBBG$dOCLCQ$dCOO$dHCO$dOCLCF$dCEF$dWYU$dC6I$dUAB$dAU@$dUKAHL$dVT2$dOCLCQ$dOCLCO
019 $a934725488$a935919790$a1066652142$a1103282419$a1129342831
020 $a9781491953648$qelectronic bk.
020 $a1491953640$qelectronic bk.
020 $a9781491953631$qelectronic bk.
020 $a1491953632$qelectronic bk.
020 $z9781491952122
020 $a1491952121
020 $a9781491952122
035 $a(OCoLC)932289267$z(OCoLC)934725488$z(OCoLC)935919790$z(OCoLC)1066652142$z(OCoLC)1103282419$z(OCoLC)1129342831
037 $aCL0500000702$bSafari Books Online
050 4 $aQA76.9.D343
072 7 $aCOM$x000000$2bisacsh
082 04 $a006.312$223
100 1 $aDunning, Ted,$d1956-$eauthor.
245 10 $aSharing big data safely :$bmanaging data security /$cTed Dunning and Ellen Friedman.
250 $aFirst edition.
264 1 $aSebastopol :$bO'Reilly Media,$c2015.
300 $a1 online resource
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
588 0 $aOnline resource; title from PDF title page (EBSCO, viewed December 30, 2015)
504 $aIncludes bibliographical references.
505 0 $aCover; Copyright; Table of Contents; Preface; ; Who Should Use This Book; Chapter 1. So Secure It's Lost; Safe Access in Secure Big Data Systems; Chapter 2. The Challenge: Sharing Data Safely; Surprising Outcomes with Anonymity; The Netflix Prize; Unexpected Results from the Netflix Contest; Implications of Breaking Anonymity; Be Alert to the Possibility of Cross-Reference Datasets; New York Taxicabs: Threats to Privacy; Sharing Data Safely; Chapter 3. Data on a Need-to-Know Basis; Views: A Secure Way to Limit What Is Seen; Why Limit Access?; Apache Drill Views for Granular Security.
505 8 $aHow Views WorkSummary of Need-to-Know Methods; Chapter 4. Fake Data Gives Real Answers; The Surprising Thing About Fake Data; Keep It Simple: log-synth; Log-synth Use Case 1: Broken Large-Scale Hive Query; Log-synth Use Case 2: Fraud Detection Model for Common Point of Compromise; What Thieves Do; Why Machine Learning Experts Were Consulted; Using log-synth to Generate Fake User Histories; Summary: Fake Data and log-synth to Safely Work with Secure Data; Chapter 5. Fixing a Broken Large-Scale Query; A Description of the Problem; Determining What the Synthetic Data Needed to Be.
505 8 $aSchema for the Synthetic DataGenerating the Synthetic Data; Tips and Caveats; What to Do from Here?; Chapter 6. Fraud Detection; What Is Really Important?; The User Model; Sampler for the Common Point of Compromise; How the Breach Model Works; Results of the Entire System Together; Handy Tricks; Summary; Chapter 7. A Detailed Look at log-synth; Goals; Maintaining Simplicity: The Role of JSON in log-synth; Structure; Sampling Complex Values; Structuring and De-structuring Samplers; Extending log-synth; Using log-synth with Apache Drill; Choice of Data Generators; R is for Random.
505 8 $aBenchmark SystemsProbabilistic Programming; Differential Privacy Preserving Systems; Future Directions for log-synth; Chapter 8. Sharing Data Safely: Practical Lessons; Appendix A. Additional Resources; Log-synth Open Source Software; Apache Drill and Drill SQL Views; General Resources and References; Cheapside Hoard and Treasures; Codes and Cipher; Netflix Prize; Problems with Data Sharing; Additional O'Reilly Books by Dunning and Friedman; About the Authors; Strata+Hadoop World.
520 $a"Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical solutions that you can implement right away. Ideal for both technical and non-technical decision makers, group leaders, developers, and data scientists, this book shows you how to: share original data in a controlled way so that different groups within your organization only see part of the whole. Youll learn how to do this with the new open source SQL query engine Apache Drill; provide synthetic data that emulates the behavior of sensitive data. This approach enables external advisors to work with you on projects involving data that you can't show them"--Back cover.
650 0 $aBig data$xSecurity measures.
650 0 $aData protection.
650 6 $aDonnées volumineuses$xSécurité$xMesures.
650 6 $aProtection de l'information (Informatique)
650 7 $aCOMPUTERS / General$2bisacsh
650 7 $aData protection.$2fast$0(OCoLC)fst00887958
655 0 $aElectronic book.
655 4 $aElectronic books.
700 1 $aFriedman, B. Ellen.$eauthor.
776 08 $iPrint version:$aDunning, Ted.$tSharing Big Data Safely : Managing Data Security.$d: O'Reilly Media, ©2016$z9781491952122
856 40 $3EBSCOhost$uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1116011
856 40 $uhttp://lib.myilibrary.com?id=879986
856 40 $3OverDrive$uhttps://www.overdrive.com/search?q=C5525C69-62FA-4B7C-9F07-977397BB03AA
856 4 $3Excerpt$uhttp://samples.overdrive.com/?crid=c5525c69-62fa-4b7c-9f07-977397bb03aa&.epub-sample.overdrive.com
856 4 $3Image$uhttp://images.contentreserve.com/ImageType-100/2858-1/{C5525C69-62FA-4B7C-9F07-977397BB03AA}Img100.jpg
856 40 $3Safari Books Online$uhttp://proquest.safaribooksonline.com/?fpi=9781491953624
856 4 $uhttp://lib.myilibrary.com/detail.asp?id=879986$xVerlag
856 40 $3ProQuest Ebook Central$uhttp://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=4333813
856 4 $uhttp://proquest.tech.safaribooksonline.de/9781491953624$xAggregator$zURL des Erstveröffentlichers$3Volltext
856 40 $uhttps://proquest.safaribooksonline.com/9781491953624
856 40 $uhttps://hclib.overdrive.com/media/C5525C69-62FA-4B7C-9F07-977397BB03AA
856 4 $uhttp://proxy.library.carleton.ca/login?url=http://proquest.safaribooksonline.com/?uiCode=carleton&xmlId=9781491953624$zSafari (Access restricted to 5 simultaneous users)
856 40 $zVIEW FULL TEXT$uhttp://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0001710928&T=marc&tab=BOOKS
856 40 $z5 simultaneous users allowed through Safari Technical Books$uhttp://ra.ocls.ca/ra/login.aspx?inst=conestoga&url=http://proquest.safaribooksonline.com/9781491953624
856 40 $3University of Alberta Access$uhttps://www.safaribooksonline.com/library/view/-/9781491953624/?ar$z(Unlimited Concurrent Users)$zfrom Safari
856 40 $uhttp://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781491953648
856 40 $uhttps://www.safaribooksonline.com/library/view/title/9781491953624/?ar?orpq&email=^u
856 40 $uhttp://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781491953631
856 40 $uhttps://www.safaribooksonline.com/library/view/-/9781491953624/?ar?orpq&email=^u
938 $aAskews and Holts Library Services$bASKH$nAH29944566
938 $aAskews and Holts Library Services$bASKH$nAH29944567
938 $aEBSCOhost$bEBSC$n1116011
938 $aProQuest MyiLibrary Digital eBook Collection$bIDEB$ncis33388491
938 $aYBP Library Services$bYANK$n12754628
938 $aCoutts Information Services$bCOUT$n33388491
938 $aProQuest Ebook Central$bEBLB$nEBL4333813
029 1 $aZWZ$b190621206
029 1 $aDEBSZ$b46117443X
029 1 $aDEBBG$bBV043968631
029 1 $aDEBSZ$b485791366
029 1 $aGBVCP$b882751158
029 1 $aAU@$b000067115045
029 1 $aAU@$b000057032018
994 $aZ0$bIME
948 $hNO HOLDINGS IN IME - 233 OTHER HOLDINGS