{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BD05272386.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BD05272386#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BD05272386.json"},"dc:title":[{"@value":"Intelligence-driven incident response : outwitting the adversary"}],"dc:creator":"Rebekah Brown and Scott J. Roberts ; foreword by Jeannie L. Johnson and Rob Lee","dc:publisher":[{"@value":"O'Reilly Media"}],"dcterms:extent":"xxv, 316 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2023","cinii:ncid":"BD05272386","prism:edition":"2nd ed","cinii:ownerCount":"1","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA19048046#entity","@type":"foaf:Person","foaf:name":[{"@value":"Brown, Rebekah (Writer on computer security)"}]},{"@id":"https://ci.nii.ac.jp/author/DA19048035#entity","@type":"foaf:Person","foaf:name":[{"@value":"Roberts, Scott J. (Writer on computer security)"}]},{"@type":"foaf:Person","foaf:name":[{"@value":"Johnson, Jeannie L."}]},{"@type":"foaf:Person","foaf:name":[{"@value":"Lee, Rob"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA011791","@type":"foaf:Organization","foaf:name":"東京大学 工学部・工学系研究科","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BD05272386"}}],"bibo:lccn":["2023281126"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2023281126"}],"prism:publicationDate":["2023"],"cinii:note":["First edition authored by Scott J. Roberts, 2017","Includes bibliographical references and index"],"dc:subject":["LCC:HV6773","DC23:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+crimes+--+Investigation","dc:title":"Computer crimes -- Investigation"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyberspace+--+Security+measures","dc:title":"Cyberspace -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Business+intelligence+--+Management","dc:title":"Business intelligence -- Management"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Data+recovery+%28Computer+science%29","dc:title":"Data recovery (Computer science)"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyber+intelligence+%28Computer+security%29","dc:title":"Cyber intelligence (Computer security)"},{"@id":"https://ci.nii.ac.jp/books/search?q=S%C3%A9curit%C3%A9+informatique","dc:title":"Sécurité informatique"},{"@id":"https://ci.nii.ac.jp/books/search?q=Surveillance+des+menaces+informatiques","dc:title":"Surveillance des menaces informatiques"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+fast","dc:title":"Computer security fast"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyber+intelligence+%28Computer+security%29+fast","dc:title":"Cyber intelligence (Computer security) fast"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781098120689"}]}]}