
The Art of Cyber Defense
From Risk Assessment to Threat Intelligence
Sorozatcím: Advances in Cybersecurity Management;
-
10% KEDVEZMÉNY?
- A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
- Kiadói listaár GBP 110.00
-
Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.
- Kedvezmény(ek) 10% (cc. 5 567 Ft off)
- Discounted price 50 104 Ft (47 718 Ft + 5% áfa)
55 671 Ft
Beszerezhetőség
Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
A Prosperónál jelenleg nincsen raktáron.
Why don't you give exact delivery time?
A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.
A termék adatai:
- Kiadás sorszáma 1
- Kiadó CRC Press
- Megjelenés dátuma 2024. november 8.
- ISBN 9781032714783
- Kötéstípus Keménykötés
- Terjedelem310 oldal
- Méret 254x178 mm
- Súly 453 g
- Nyelv angol
- Illusztrációk 141 Illustrations, black & white; 7 Halftones, black & white; 134 Line drawings, black & white; 37 Tables, black & white 771
Kategóriák
Rövid leírás:
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
TöbbHosszú leírás:
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures.
Delving into the nuances of modern cyber threats, this book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber?attacks.
This book offers comprehensive coverage of the most essential topics, including:
- Advanced malware detection and prevention strategies leveraging artificial intelligence (AI)
- Hybrid deep learning techniques for malware classification
- Machine learning solutions and research perspectives on Internet of Services (IoT) security
- Comprehensive analysis of blockchain techniques for enhancing IoT security and privacy
- Practical approaches to integrating security analysis modules for proactive threat intelligence
This book is an essential reference for students, researchers, cybersecurity professionals, and anyone interested in understanding and addressing contemporary cyber defense and risk assessment challenges. It provides a valuable resource for enhancing cybersecurity awareness, knowledge, and practical skills.
TöbbTartalomjegyzék:
Part I: Foundations of Cyber Defense and Risk Assessment
Chapter 1: AI-Powered Strategies for Advanced Malware Detection and Prevention
Chapter 2: Advancing Malware Classification with Hybrid Deep Learning
Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things
Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and Research Perspectives
Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and Privacy: A Comprehensive Analysis
Part II: Analyzing and Responding to Emerging Threats
Chapter 6: Integrating Security Analysis Module for Proactive Threat Intelligence
Chapter 7: Security Study of Web Applications through a White Box Audit Approach: A Case Study
Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security Study of Web Applications
Chapter 9: Security in Cloud-Based IoT: A Survey
Chapter 10: Exploring IoT penetration testing: From fundamentals to practical setup
Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol
Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning
Chapter 13: An adaptive cybersecurity strategy based on game theory to manage emerging threats In The SDN Infrastructure
Part III: Human-Centric Risk Mitigation Approaches
Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation
Chapter 15: Human Factors in Cyber Defense
Chapter 16: Security Operation Center: Towards A Maturity Model
Több