000 03445cam a22005298i 4500
001 9781003006145
003 FlBoTFG
005 20230516170540.0
006 m d u
007 cr |||||||||||
008 201009s2021 flu ob 001 0 eng
040 _aOCoLC-P
_beng
_erda
_cOCoLC-P
020 _a9781003006145
_q(ebook)
020 _a1003006140
020 _a9781000366600
_q(electronic bk.)
020 _a100036660X
_q(electronic bk.)
020 _a9781000366617
_q(electronic bk. : EPUB)
020 _a1000366618
_q(electronic bk. : EPUB)
020 _z9780367433314
_q(hardback)
035 _a(OCoLC)1200831869
035 _a(OCoLC-P)1200831869
050 0 0 _aQA76.9.A25
072 7 _aLAW
_x041000
_2bisacsh
072 7 _aTEC
_x020000
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aJKVF1
_2bicssc
082 0 0 _a005.8
_223
245 0 0 _aCyber-security threats, actors, and dynamic mitigation /
_cedited by Nicholas Kolokotronis and Stavros Shiaeles.
264 1 _aBoca Raton :
_bCRC Press,
_c2021.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bn
_2rdamedia
338 _aonline resource
_bnc
_2rdacarrier
505 2 _aCyber-attackers' profiling / Dimitris Kavallieros (University of the Peloponnese, Center for Security Studies, Georgios Germanos (Univeristy of the Peloponnese, Nicholas Kolokotronis (University of the Peloponnese)
520 _a"This book provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modelling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modelling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often"--
_cProvided by publisher.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer security.
_93970
650 0 _aComputer crimes
_xPrevention.
_97872
650 7 _aLAW / Forensic Science
_2bisacsh
_914530
650 7 _aTECHNOLOGY / Manufacturing
_2bisacsh
_910872
650 7 _aCOMPUTERS / Security / General
_2bisacsh
_96769
700 1 _aKolokotronis, Nicholas,
_eeditor.
_971427
700 1 _aShiaeles, Stavros,
_eeditor.
_971428
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003006145
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _cEBK
999 _c83025
_d83025