Exploring malicious hacker communities: toward proactive cyber-defense
Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack predictio...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge, United Kingdom ; New York, NY, USA ; Port Melbourne, VIC, Australia ; New Delhi, India ; Singapore
Cambridge University Press
[2021]
|
Schlagworte: | |
Zusammenfassung: | Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xii, 211 Seiten Illustrationen, Diagramme |
ISBN: | 9781108491594 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV047295691 | ||
003 | DE-604 | ||
005 | 20230810 | ||
007 | t | ||
008 | 210525s2021 xxka||| |||| 00||| eng d | ||
020 | |a 9781108491594 |c Hardback |9 978-1-108-49159-4 | ||
035 | |a (OCoLC)1261744917 | ||
035 | |a (DE-599)KXP1744461880 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c XA-GB | ||
049 | |a DE-91G |a DE-19 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 363.325 | |
084 | |a DAT 055 |2 stub | ||
100 | 1 | |a Marin, Ericsson |e Verfasser |0 (DE-588)1167978943 |4 aut | |
245 | 1 | 0 | |a Exploring malicious hacker communities |b toward proactive cyber-defense |c Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian |
264 | 1 | |a Cambridge, United Kingdom ; New York, NY, USA ; Port Melbourne, VIC, Australia ; New Delhi, India ; Singapore |b Cambridge University Press |c [2021] | |
300 | |a xii, 211 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations | |
653 | 0 | |a Cyber intelligence (Computer security) | |
653 | 0 | |a Hackers / Social networks | |
653 | 0 | |a Social sciences / Network analysis | |
653 | 0 | |a Data mining | |
653 | 0 | |a Hacking / Prevention | |
653 | 0 | |a Cyberterrorism / Prevention | |
700 | 1 | |a Almukaynizi, Mohammed |d 1987- |e Verfasser |0 (DE-588)1234083841 |4 aut | |
700 | 1 | |a Sarkar, Soumajyoti |d 1992- |e Verfasser |0 (DE-588)1234084449 |4 aut | |
700 | 1 | |a Nunes, Eric |e Verfasser |0 (DE-588)1167978951 |4 aut | |
700 | 1 | |a Shakarian, Jana |d 1977- |e Verfasser |0 (DE-588)1234085062 |4 aut | |
700 | 1 | |a Shakarian, Paulo |d 1980- |e Verfasser |0 (DE-588)1234085496 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |a Marin, Ericsson |t Exploring malicious hacker communities |d Cambridge ; New York, NY : Cambridge University Press, 2021 |n Online-Ausgabe, EPUB |z 978-1-108-86900-3 |
999 | |a oai:aleph.bib-bvb.de:BVB01-032698951 |
Datensatz im Suchindex
_version_ | 1804182471885979648 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Marin, Ericsson Almukaynizi, Mohammed 1987- Sarkar, Soumajyoti 1992- Nunes, Eric Shakarian, Jana 1977- Shakarian, Paulo 1980- |
author_GND | (DE-588)1167978943 (DE-588)1234083841 (DE-588)1234084449 (DE-588)1167978951 (DE-588)1234085062 (DE-588)1234085496 |
author_facet | Marin, Ericsson Almukaynizi, Mohammed 1987- Sarkar, Soumajyoti 1992- Nunes, Eric Shakarian, Jana 1977- Shakarian, Paulo 1980- |
author_role | aut aut aut aut aut aut |
author_sort | Marin, Ericsson |
author_variant | e m em m a ma s s ss e n en j s js p s ps |
building | Verbundindex |
bvnumber | BV047295691 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_tum | DAT 055 |
ctrlnum | (OCoLC)1261744917 (DE-599)KXP1744461880 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Informatik Soziologie |
discipline_str_mv | Informatik Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02412nam a22004698c 4500</leader><controlfield tag="001">BV047295691</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230810 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210525s2021 xxka||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781108491594</subfield><subfield code="c">Hardback</subfield><subfield code="9">978-1-108-49159-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1261744917</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1744461880</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">XA-GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Marin, Ericsson</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1167978943</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploring malicious hacker communities</subfield><subfield code="b">toward proactive cyber-defense</subfield><subfield code="c">Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, United Kingdom ; New York, NY, USA ; Port Melbourne, VIC, Australia ; New Delhi, India ; Singapore</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 211 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hackers / Social networks</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Social sciences / Network analysis</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data mining</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hacking / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Almukaynizi, Mohammed</subfield><subfield code="d">1987-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1234083841</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sarkar, Soumajyoti</subfield><subfield code="d">1992-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1234084449</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nunes, Eric</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1167978951</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Jana</subfield><subfield code="d">1977-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1234085062</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Paulo</subfield><subfield code="d">1980-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1234085496</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="a">Marin, Ericsson</subfield><subfield code="t">Exploring malicious hacker communities</subfield><subfield code="d">Cambridge ; New York, NY : Cambridge University Press, 2021</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-1-108-86900-3</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032698951</subfield></datafield></record></collection> |
id | DE-604.BV047295691 |
illustrated | Illustrated |
index_date | 2024-07-03T17:21:49Z |
indexdate | 2024-07-10T09:08:05Z |
institution | BVB |
isbn | 9781108491594 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032698951 |
oclc_num | 1261744917 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-19 DE-BY-UBM |
owner_facet | DE-91G DE-BY-TUM DE-19 DE-BY-UBM |
physical | xii, 211 Seiten Illustrationen, Diagramme |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Marin, Ericsson Verfasser (DE-588)1167978943 aut Exploring malicious hacker communities toward proactive cyber-defense Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian Cambridge, United Kingdom ; New York, NY, USA ; Port Melbourne, VIC, Australia ; New Delhi, India ; Singapore Cambridge University Press [2021] xii, 211 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations Cyber intelligence (Computer security) Hackers / Social networks Social sciences / Network analysis Data mining Hacking / Prevention Cyberterrorism / Prevention Almukaynizi, Mohammed 1987- Verfasser (DE-588)1234083841 aut Sarkar, Soumajyoti 1992- Verfasser (DE-588)1234084449 aut Nunes, Eric Verfasser (DE-588)1167978951 aut Shakarian, Jana 1977- Verfasser (DE-588)1234085062 aut Shakarian, Paulo 1980- Verfasser (DE-588)1234085496 aut Erscheint auch als Marin, Ericsson Exploring malicious hacker communities Cambridge ; New York, NY : Cambridge University Press, 2021 Online-Ausgabe, EPUB 978-1-108-86900-3 |
spellingShingle | Marin, Ericsson Almukaynizi, Mohammed 1987- Sarkar, Soumajyoti 1992- Nunes, Eric Shakarian, Jana 1977- Shakarian, Paulo 1980- Exploring malicious hacker communities toward proactive cyber-defense |
title | Exploring malicious hacker communities toward proactive cyber-defense |
title_auth | Exploring malicious hacker communities toward proactive cyber-defense |
title_exact_search | Exploring malicious hacker communities toward proactive cyber-defense |
title_exact_search_txtP | Exploring malicious hacker communities toward proactive cyber-defense |
title_full | Exploring malicious hacker communities toward proactive cyber-defense Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian |
title_fullStr | Exploring malicious hacker communities toward proactive cyber-defense Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian |
title_full_unstemmed | Exploring malicious hacker communities toward proactive cyber-defense Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian |
title_short | Exploring malicious hacker communities |
title_sort | exploring malicious hacker communities toward proactive cyber defense |
title_sub | toward proactive cyber-defense |
work_keys_str_mv | AT marinericsson exploringmalicioushackercommunitiestowardproactivecyberdefense AT almukaynizimohammed exploringmalicioushackercommunitiestowardproactivecyberdefense AT sarkarsoumajyoti exploringmalicioushackercommunitiestowardproactivecyberdefense AT nuneseric exploringmalicioushackercommunitiestowardproactivecyberdefense AT shakarianjana exploringmalicioushackercommunitiestowardproactivecyberdefense AT shakarianpaulo exploringmalicioushackercommunitiestowardproactivecyberdefense |