000 | 03445cam a22005298i 4500 | ||
---|---|---|---|
001 | 9781003006145 | ||
003 | FlBoTFG | ||
005 | 20230516170540.0 | ||
006 | m d u | ||
007 | cr ||||||||||| | ||
008 | 201009s2021 flu ob 001 0 eng | ||
040 |
_aOCoLC-P _beng _erda _cOCoLC-P |
||
020 |
_a9781003006145 _q(ebook) |
||
020 | _a1003006140 | ||
020 |
_a9781000366600 _q(electronic bk.) |
||
020 |
_a100036660X _q(electronic bk.) |
||
020 |
_a9781000366617 _q(electronic bk. : EPUB) |
||
020 |
_a1000366618 _q(electronic bk. : EPUB) |
||
020 |
_z9780367433314 _q(hardback) |
||
035 | _a(OCoLC)1200831869 | ||
035 | _a(OCoLC-P)1200831869 | ||
050 | 0 | 0 | _aQA76.9.A25 |
072 | 7 |
_aLAW _x041000 _2bisacsh |
|
072 | 7 |
_aTEC _x020000 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
072 | 7 |
_aJKVF1 _2bicssc |
|
082 | 0 | 0 |
_a005.8 _223 |
245 | 0 | 0 |
_aCyber-security threats, actors, and dynamic mitigation / _cedited by Nicholas Kolokotronis and Stavros Shiaeles. |
264 | 1 |
_aBoca Raton : _bCRC Press, _c2021. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bn _2rdamedia |
||
338 |
_aonline resource _bnc _2rdacarrier |
||
505 | 2 | _aCyber-attackers' profiling / Dimitris Kavallieros (University of the Peloponnese, Center for Security Studies, Georgios Germanos (Univeristy of the Peloponnese, Nicholas Kolokotronis (University of the Peloponnese) | |
520 |
_a"This book provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modelling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modelling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often"-- _cProvided by publisher. |
||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 |
_aComputer security. _93970 |
|
650 | 0 |
_aComputer crimes _xPrevention. _97872 |
|
650 | 7 |
_aLAW / Forensic Science _2bisacsh _914530 |
|
650 | 7 |
_aTECHNOLOGY / Manufacturing _2bisacsh _910872 |
|
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh _96769 |
|
700 | 1 |
_aKolokotronis, Nicholas, _eeditor. _971427 |
|
700 | 1 |
_aShiaeles, Stavros, _eeditor. _971428 |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781003006145 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 | _cEBK | ||
999 |
_c83025 _d83025 |