{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB25289809.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB25289809#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB25289809.json"},"dc:title":[{"@value":"Intelligence-driven incident response : outwitting the adversary"}],"dc:creator":"Scott J. Roberts and Rebekah Brown","dc:publisher":[{"@value":"O'Reilly"}],"dcterms:extent":"xvii, 260 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2017","cinii:ncid":"BB25289809","cinii:ownerCount":"3","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA19048035#entity","@type":"foaf:Person","foaf:name":[{"@value":"Roberts, Scott J. (Writer on computer security)"}]},{"@id":"https://ci.nii.ac.jp/author/DA19048046#entity","@type":"foaf:Person","foaf:name":[{"@value":"Brown, Rebekah (Writer on computer security)"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA002611","@type":"foaf:Organization","foaf:name":"京都大学 附属図書館","rdfs:seeAlso":{"@id":"https://kuline.kulib.kyoto-u.ac.jp/opac/opac_openurl/?ncid=BB25289809"}},{"@id":"https://ci.nii.ac.jp/library/FA018622","@type":"foaf:Organization","foaf:name":"長崎県立大学 シーボルト校 附属図書館","rdfs:seeAlso":{"@id":"http://carin-opac.sun.ac.jp/intrasite/CARINOPACLINK.HTM?OIN=<NCID・"}},{"@id":"https://ci.nii.ac.jp/library/FA012943","@type":"foaf:Organization","foaf:name":"国立情報学研究所","rdfs:seeAlso":{"@id":"https://nii-library.primo.exlibrisgroup.com/discovery/search?query=lds01,contains,BB25289809,AND&tab=Everything&search_scope=MyInst_and_CI&vid=81NII_LIB:81NII_LIB&lang=ja&mode=simple&offset=0"}}],"prism:publicationDate":["2017"],"cinii:note":["Includes index"],"dc:subject":["DC23:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+crimes+--+Investigation","dc:title":"Computer crimes -- Investigation"},{"@id":"https://ci.nii.ac.jp/books/search?q=Data+recovery+%28Computer+science%29","dc:title":"Data recovery (Computer science)"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781491934944","dc:title":": pbk"}]}]}