Darkweb cyber threat intelligence mining:
The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts exami...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2017
|
Schlagworte: | |
Online-Zugang: | BSB01 FHN01 UBT01 UER01 URL des Erstveröffentlichers |
Zusammenfassung: | The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results |
Beschreibung: | Title from publisher's bibliographic system (viewed on 21 Apr 2017) |
Beschreibung: | 1 online resource (ix, 137 pages) |
ISBN: | 9781316888513 |
DOI: | 10.1017/9781316888513 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044369047 | ||
003 | DE-604 | ||
005 | 20190719 | ||
007 | cr|uuu---uuuuu | ||
008 | 170626s2017 |||| o||u| ||||||eng d | ||
020 | |a 9781316888513 |9 978-1-316-88851-3 | ||
024 | 7 | |a 10.1017/9781316888513 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781316888513 | ||
035 | |a (OCoLC)992516378 | ||
035 | |a (DE-599)BVBBV044369047 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-703 |a DE-29 |a DE-92 | ||
082 | 0 | |a 364.168 | |
100 | 1 | |a Robertson, John |e Verfasser |4 aut | |
245 | 1 | 0 | |a Darkweb cyber threat intelligence mining |c John Robertson, Arizona State University, [and six others] |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2017 | |
300 | |a 1 online resource (ix, 137 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 21 Apr 2017) | ||
520 | |a The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results | ||
650 | 4 | |a Computer crimes | |
650 | 4 | |a Cyber intelligence (Computer security) | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardback |z 978-1-107-18577-7 |
856 | 4 | 0 | |u https://doi.org/10.1017/9781316888513 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029771500 | ||
966 | e | |u https://doi.org/10.1017/9781316888513 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/9781316888513 |l FHN01 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/9781316888513 |l UBT01 |p ZDB-20-CBO |q UBT_PDA_CBO_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/9781316888513 |l UER01 |p ZDB-20-CBO |q UER_PDA_CBO_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804177622646652928 |
---|---|
any_adam_object | |
author | Robertson, John |
author_facet | Robertson, John |
author_role | aut |
author_sort | Robertson, John |
author_variant | j r jr |
building | Verbundindex |
bvnumber | BV044369047 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9781316888513 (OCoLC)992516378 (DE-599)BVBBV044369047 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
doi_str_mv | 10.1017/9781316888513 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02687nmm a2200421zc 4500</leader><controlfield tag="001">BV044369047</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190719 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170626s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781316888513</subfield><subfield code="9">978-1-316-88851-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/9781316888513</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781316888513</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992516378</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044369047</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Robertson, John</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Darkweb cyber threat intelligence mining</subfield><subfield code="c">John Robertson, Arizona State University, [and six others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 137 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 21 Apr 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardback</subfield><subfield code="z">978-1-107-18577-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/9781316888513</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029771500</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781316888513</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781316888513</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781316888513</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBT_PDA_CBO_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781316888513</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UER_PDA_CBO_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044369047 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:51:00Z |
institution | BVB |
isbn | 9781316888513 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029771500 |
oclc_num | 992516378 |
open_access_boolean | |
owner | DE-12 DE-703 DE-29 DE-92 |
owner_facet | DE-12 DE-703 DE-29 DE-92 |
physical | 1 online resource (ix, 137 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO_Kauf ZDB-20-CBO FHN_PDA_CBO ZDB-20-CBO UBT_PDA_CBO_Kauf ZDB-20-CBO UER_PDA_CBO_Kauf |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Robertson, John Verfasser aut Darkweb cyber threat intelligence mining John Robertson, Arizona State University, [and six others] Cambridge Cambridge University Press 2017 1 online resource (ix, 137 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 21 Apr 2017) The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results Computer crimes Cyber intelligence (Computer security) Erscheint auch als Druck-Ausgabe, hardback 978-1-107-18577-7 https://doi.org/10.1017/9781316888513 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Robertson, John Darkweb cyber threat intelligence mining Computer crimes Cyber intelligence (Computer security) |
title | Darkweb cyber threat intelligence mining |
title_auth | Darkweb cyber threat intelligence mining |
title_exact_search | Darkweb cyber threat intelligence mining |
title_full | Darkweb cyber threat intelligence mining John Robertson, Arizona State University, [and six others] |
title_fullStr | Darkweb cyber threat intelligence mining John Robertson, Arizona State University, [and six others] |
title_full_unstemmed | Darkweb cyber threat intelligence mining John Robertson, Arizona State University, [and six others] |
title_short | Darkweb cyber threat intelligence mining |
title_sort | darkweb cyber threat intelligence mining |
topic | Computer crimes Cyber intelligence (Computer security) |
topic_facet | Computer crimes Cyber intelligence (Computer security) |
url | https://doi.org/10.1017/9781316888513 |
work_keys_str_mv | AT robertsonjohn darkwebcyberthreatintelligencemining |