The Art of Cyber Defense (eBook, PDF)
From Risk Assessment to Threat Intelligence
Redaktion: Baddi, Youssef; Maleh, Yassine; Almomani, Omar; Almaiah, Mohammed Amin
52,95 €
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
52,95 €
Als Download kaufen
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
The Art of Cyber Defense (eBook, PDF)
From Risk Assessment to Threat Intelligence
Redaktion: Baddi, Youssef; Maleh, Yassine; Almomani, Omar; Almaiah, Mohammed Amin
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
Andere Kunden interessierten sich auch für
- The Art of Cyber Defense (eBook, ePUB)52,95 €
- Andres AndreuThe CISO Playbook (eBook, PDF)47,95 €
- Akashdeep BhardwajInsecure Digital Frontiers (eBook, PDF)47,95 €
- Ravindra DasThe Zero Trust Framework and Privileged Access Management (PAM) (eBook, PDF)31,95 €
- Atif AliSpies in the Bits and Bytes (eBook, PDF)47,95 €
- Lukasz OlejnikPhilosophy of Cybersecurity (eBook, PDF)47,95 €
- Secure Health (eBook, PDF)52,95 €
-
-
-
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 310
- Erscheinungstermin: 8. November 2024
- Englisch
- ISBN-13: 9781040124130
- Artikelnr.: 72352429
- Verlag: Taylor & Francis
- Seitenzahl: 310
- Erscheinungstermin: 8. November 2024
- Englisch
- ISBN-13: 9781040124130
- Artikelnr.: 72352429
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Prof. Youssef Baddi is full-time Associate Professor at Chouaïb Doukkali University UCD EL Jadida, Morocco. Phd Thesis degree in computer science from ENSIAS School, University Mohammed V Souissi of Rabat, Morocco, since 2016. He also holds a Research Master's degree in networking obtained in 2010 from the High National School for Computer Science and Systems Analysis - ENSIAS-Morocco-Rabat. Prof. Mohammed Amin Almaiah obtained his PhD in Computer Science from University Malaysia Terengganu from Malaysia. MSc in Computer Information System from Middle East University (MEU) in 2011 from Jordan. He is now working as Associate Professor in the Department of Computer networks and Communications at King Faisal Saudi Arabia. Prof. Omar Almomani received his bachelor's and master's degrees in telecommunication technology from the Institute of Information Technology at the University of Sindh in 2002 and 2003, respectively. In 2010, he received his Ph.D. in computer networking from the UUM. Currently, he is a professor at the Information Technology Faculty of the World Islamic Sciences and Education University. Prof. Yassine Maleh is an Associate professor of cybersecurity and IT governance at Sultan Moulay Slimane University, Morocco, since 2019. He is the founding chair of IEEE Consultant Network Morocco and founding president of the African Research Center of Information Technology & Cybersecurity. He is a former CISO at the National Port Agency between 2012-2019. He is a senior member of IEEE and a member of the International Association of Engineers IAENG and The Machine Intelligence Research Labs.
Part I: Foundations of Cyber Defense and Risk Assessment
Chapter 1: AI-Powered Strategies for Advanced Malware Detection and
Prevention
Chapter 2: Advancing Malware Classification with Hybrid Deep Learning
Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for
Security in Internet of Things
Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and
Research Perspectives
Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and
Privacy: A Comprehensive Analysis
Part II: Analyzing and Responding to Emerging Threats
Chapter 6: Integrating Security Analysis Module for Proactive Threat
Intelligence
Chapter 7: Security Study of Web Applications through a White Box Audit
Approach: A Case Study
Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security
Study of Web Applications
Chapter 9: Security in Cloud-Based IoT: A Survey
Chapter 10: Exploring IoT penetration testing: From fundamentals to
practical setup
Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes
and encouraging cooperation in Optimized Link State Routing protocol
Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving
Based on Federated Learning
Chapter 13: An adaptive cybersecurity strategy based on game theory to
manage emerging threats In The SDN Infrastructure
Part III: Human-Centric Risk Mitigation Approaches
Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation
Chapter 15: Human Factors in Cyber Defense
Chapter 16: Security Operation Center: Towards A Maturity Model
Chapter 1: AI-Powered Strategies for Advanced Malware Detection and
Prevention
Chapter 2: Advancing Malware Classification with Hybrid Deep Learning
Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for
Security in Internet of Things
Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and
Research Perspectives
Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and
Privacy: A Comprehensive Analysis
Part II: Analyzing and Responding to Emerging Threats
Chapter 6: Integrating Security Analysis Module for Proactive Threat
Intelligence
Chapter 7: Security Study of Web Applications through a White Box Audit
Approach: A Case Study
Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security
Study of Web Applications
Chapter 9: Security in Cloud-Based IoT: A Survey
Chapter 10: Exploring IoT penetration testing: From fundamentals to
practical setup
Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes
and encouraging cooperation in Optimized Link State Routing protocol
Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving
Based on Federated Learning
Chapter 13: An adaptive cybersecurity strategy based on game theory to
manage emerging threats In The SDN Infrastructure
Part III: Human-Centric Risk Mitigation Approaches
Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation
Chapter 15: Human Factors in Cyber Defense
Chapter 16: Security Operation Center: Towards A Maturity Model
Part I: Foundations of Cyber Defense and Risk Assessment
Chapter 1: AI-Powered Strategies for Advanced Malware Detection and
Prevention
Chapter 2: Advancing Malware Classification with Hybrid Deep Learning
Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for
Security in Internet of Things
Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and
Research Perspectives
Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and
Privacy: A Comprehensive Analysis
Part II: Analyzing and Responding to Emerging Threats
Chapter 6: Integrating Security Analysis Module for Proactive Threat
Intelligence
Chapter 7: Security Study of Web Applications through a White Box Audit
Approach: A Case Study
Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security
Study of Web Applications
Chapter 9: Security in Cloud-Based IoT: A Survey
Chapter 10: Exploring IoT penetration testing: From fundamentals to
practical setup
Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes
and encouraging cooperation in Optimized Link State Routing protocol
Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving
Based on Federated Learning
Chapter 13: An adaptive cybersecurity strategy based on game theory to
manage emerging threats In The SDN Infrastructure
Part III: Human-Centric Risk Mitigation Approaches
Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation
Chapter 15: Human Factors in Cyber Defense
Chapter 16: Security Operation Center: Towards A Maturity Model
Chapter 1: AI-Powered Strategies for Advanced Malware Detection and
Prevention
Chapter 2: Advancing Malware Classification with Hybrid Deep Learning
Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for
Security in Internet of Things
Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and
Research Perspectives
Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and
Privacy: A Comprehensive Analysis
Part II: Analyzing and Responding to Emerging Threats
Chapter 6: Integrating Security Analysis Module for Proactive Threat
Intelligence
Chapter 7: Security Study of Web Applications through a White Box Audit
Approach: A Case Study
Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security
Study of Web Applications
Chapter 9: Security in Cloud-Based IoT: A Survey
Chapter 10: Exploring IoT penetration testing: From fundamentals to
practical setup
Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes
and encouraging cooperation in Optimized Link State Routing protocol
Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving
Based on Federated Learning
Chapter 13: An adaptive cybersecurity strategy based on game theory to
manage emerging threats In The SDN Infrastructure
Part III: Human-Centric Risk Mitigation Approaches
Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation
Chapter 15: Human Factors in Cyber Defense
Chapter 16: Security Operation Center: Towards A Maturity Model