• Contact

  • Newsletter

  • About us

  • Delivery options

  • News

  • 0
    The Art of Cyber Defense: From Risk Assessment to Threat Intelligence

    The Art of Cyber Defense by Baddi, Youssef; Almaiah, Mohammed Amin; Almomani, Omar;

    From Risk Assessment to Threat Intelligence

    Series: Advances in Cybersecurity Management;

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 110.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        55 671 Ft (53 020 Ft + 5% VAT)
      • Discount 10% (cc. 5 567 Ft off)
      • Discounted price 50 104 Ft (47 718 Ft + 5% VAT)

    55 671 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.

    More

    Long description:

    The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures.


    Delving into the nuances of modern cyber threats, this book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber?attacks.


    This book offers comprehensive coverage of the most essential topics, including:



    • Advanced malware detection and prevention strategies leveraging artificial intelligence (AI)

    • Hybrid deep learning techniques for malware classification

    • Machine learning solutions and research perspectives on Internet of Services (IoT) security

    • Comprehensive analysis of blockchain techniques for enhancing IoT security and privacy

    • Practical approaches to integrating security analysis modules for proactive threat intelligence

    This book is an essential reference for students, researchers, cybersecurity professionals, and anyone interested in understanding and addressing contemporary cyber defense and risk assessment challenges. It provides a valuable resource for enhancing cybersecurity awareness, knowledge, and practical skills.

    More

    Table of Contents:

    Part I: Foundations of Cyber Defense and Risk Assessment


    Chapter 1: AI-Powered Strategies for Advanced Malware Detection and Prevention


    Chapter 2: Advancing Malware Classification with Hybrid Deep Learning


    Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things


    Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and Research Perspectives


    Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and Privacy: A Comprehensive Analysis


    Part II: Analyzing and Responding to Emerging Threats


    Chapter 6: Integrating Security Analysis Module for Proactive Threat Intelligence


    Chapter 7: Security Study of Web Applications through a White Box Audit Approach: A Case Study


    Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security Study of Web Applications


    Chapter 9: Security in Cloud-Based IoT: A Survey


    Chapter 10: Exploring IoT penetration testing: From fundamentals to practical setup


    Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol


    Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning


    Chapter 13: An adaptive cybersecurity strategy based on game theory to manage emerging threats In The SDN Infrastructure


    Part III: Human-Centric Risk Mitigation Approaches


    Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation


    Chapter 15: Human Factors in Cyber Defense


    Chapter 16: Security Operation Center: Towards A Maturity Model

    More