Cyber-Security Threats, Actors, and Dynamic Mitigation (e-bog) af -
Shiaeles, Stavros (redaktør)

Cyber-Security Threats, Actors, and Dynamic Mitigation e-bog

948,41 DKK (inkl. moms 1185,51 DKK)
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT....
E-bog 948,41 DKK
Forfattere Shiaeles, Stavros (redaktør)
Forlag CRC Press
Udgivet 4 april 2021
Længde 374 sider
Genrer Criminal law: procedure and offences
Sprog English
Format epub
Beskyttelse LCP
ISBN 9781000366617
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT.With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits.Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. a Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.