Darkweb cyber threat intelligence mining / John Robertson, Arizona State University, [and six others].
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781107185777
- 1107185777
- QA76.9.A25 R6326 2017
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 R6326 2017 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000031869 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 R6326 2017 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30020000031454 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 R6326 2017 (إستعراض الرف(يفتح أدناه)) | C.3 | المتاح | 30020000080427 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 R6326 2017 (إستعراض الرف(يفتح أدناه)) | C.4 | المتاح | 30020000080423 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
QA76.9.A25 R3374 2013 Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols / | QA76.9.A25 R6326 2017 Darkweb cyber threat intelligence mining / | QA76.9.A25 R6326 2017 Darkweb cyber threat intelligence mining / | QA76.9.A25 R6326 2017 Darkweb cyber threat intelligence mining / | QA76.9.A25 R6326 2017 Darkweb cyber threat intelligence mining / | QA76.9.A25 S27 2001 أمن الحاسوب والمعلومات / | QA76.9.A25 S27 2001 أمن الحاسوب والمعلومات / |
Includes bibliographical references (pages 127-134) and index.
Moving to proactive cyber threat intelligence -- Understanding darkweb malicious hacker forums -- Automatic mining of cyber intelligence from the darkweb -- Analyzing products and vendors in malicious hacking markets -- Using game theory for threat intelligence -- Application : protecting industrial control systems.
"In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the darkweb. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas, techniques and buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the darkweb and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results."--Page 4 of cover.