Exploring malicious hacker communities: toward proactive cyber defence
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2021
|
Schlagworte: | |
Online-Zugang: | BSB01 FHN01 TUM01 UBG01 Volltext |
Beschreibung: | Title from publisher's bibliographic system (viewed on 10 Mar 2021) Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations |
Beschreibung: | 1 Online-Ressource (xii, 211 Seiten) |
ISBN: | 9781108869003 |
DOI: | 10.1017/9781108869003 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047341407 | ||
003 | DE-604 | ||
005 | 20221205 | ||
007 | cr|uuu---uuuuu | ||
008 | 210623s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781108869003 |c Online |9 978-1-108-86900-3 | ||
024 | 7 | |a 10.1017/9781108869003 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781108869003 | ||
035 | |a (OCoLC)1257814396 | ||
035 | |a (DE-599)BVBBV047341407 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-92 |a DE-473 |a DE-91 | ||
082 | 0 | |a 363.325 | |
100 | 1 | |a Marin, Ericsson |0 (DE-588)1167978943 |4 aut | |
245 | 1 | 0 | |a Exploring malicious hacker communities |b toward proactive cyber defence |c Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian ; foreword by Edward G. Amoroso |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2021 | |
300 | |a 1 Online-Ressource (xii, 211 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 10 Mar 2021) | ||
500 | |a Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations | ||
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Cyberterrorism / Prevention | |
650 | 4 | |a Hacking / Prevention | |
650 | 4 | |a Data mining | |
650 | 4 | |a Social sciences / Network analysis | |
650 | 4 | |a Hackers / Social networks | |
700 | 1 | |a Almukaynizi, Mohammed |d 1987- |0 (DE-588)1234083841 |4 aut | |
700 | 1 | |a Shakarian, Paulo |d 1980- |0 (DE-588)1234085496 |4 aut | |
700 | 1 | |a Shakarian, Jana |d 1977- |0 (DE-588)1234085062 |4 aut | |
700 | 1 | |a Nunes, Eric |0 (DE-588)1167978951 |4 aut | |
700 | 1 | |a Sarkar, Soumajyoti |d 1992- |0 (DE-588)1234084449 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-108-49159-4 |
856 | 4 | 0 | |u https://doi.org/10.1017/9781108869003 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032743800 | ||
966 | e | |u https://doi.org/10.1017/9781108869003 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/9781108869003 |l FHN01 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/9781108869003 |l TUM01 |p ZDB-20-CBO |q TUM_Paketkauf_2021 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/9781108869003 |l UBG01 |p ZDB-20-CBO |q UBG_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182558146035712 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Marin, Ericsson Almukaynizi, Mohammed 1987- Shakarian, Paulo 1980- Shakarian, Jana 1977- Nunes, Eric Sarkar, Soumajyoti 1992- |
author_GND | (DE-588)1167978943 (DE-588)1234083841 (DE-588)1234085496 (DE-588)1234085062 (DE-588)1167978951 (DE-588)1234084449 |
author_facet | Marin, Ericsson Almukaynizi, Mohammed 1987- Shakarian, Paulo 1980- Shakarian, Jana 1977- Nunes, Eric Sarkar, Soumajyoti 1992- |
author_role | aut aut aut aut aut aut |
author_sort | Marin, Ericsson |
author_variant | e m em m a ma p s ps j s js e n en s s ss |
building | Verbundindex |
bvnumber | BV047341407 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9781108869003 (OCoLC)1257814396 (DE-599)BVBBV047341407 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
discipline_str_mv | Soziologie |
doi_str_mv | 10.1017/9781108869003 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02753nmm a2200529zc 4500</leader><controlfield tag="001">BV047341407</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221205 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210623s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781108869003</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-108-86900-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/9781108869003</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781108869003</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1257814396</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047341407</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Marin, Ericsson</subfield><subfield code="0">(DE-588)1167978943</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploring malicious hacker communities</subfield><subfield code="b">toward proactive cyber defence</subfield><subfield code="c">Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian ; foreword by Edward G. Amoroso</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 211 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 10 Mar 2021)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social sciences / Network analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers / Social networks</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Almukaynizi, Mohammed</subfield><subfield code="d">1987-</subfield><subfield code="0">(DE-588)1234083841</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Paulo</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1234085496</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Jana</subfield><subfield code="d">1977-</subfield><subfield code="0">(DE-588)1234085062</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nunes, Eric</subfield><subfield code="0">(DE-588)1167978951</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sarkar, Soumajyoti</subfield><subfield code="d">1992-</subfield><subfield code="0">(DE-588)1234084449</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-108-49159-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/9781108869003</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032743800</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781108869003</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781108869003</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781108869003</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">TUM_Paketkauf_2021</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781108869003</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBG_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047341407 |
illustrated | Not Illustrated |
index_date | 2024-07-03T17:34:30Z |
indexdate | 2024-07-10T09:09:27Z |
institution | BVB |
isbn | 9781108869003 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032743800 |
oclc_num | 1257814396 |
open_access_boolean | |
owner | DE-12 DE-92 DE-473 DE-BY-UBG DE-91 DE-BY-TUM |
owner_facet | DE-12 DE-92 DE-473 DE-BY-UBG DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xii, 211 Seiten) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO ZDB-20-CBO TUM_Paketkauf_2021 ZDB-20-CBO UBG_PDA_CBO |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Marin, Ericsson (DE-588)1167978943 aut Exploring malicious hacker communities toward proactive cyber defence Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian ; foreword by Edward G. Amoroso Cambridge Cambridge University Press 2021 1 Online-Ressource (xii, 211 Seiten) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 10 Mar 2021) Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations Cyber intelligence (Computer security) Cyberterrorism / Prevention Hacking / Prevention Data mining Social sciences / Network analysis Hackers / Social networks Almukaynizi, Mohammed 1987- (DE-588)1234083841 aut Shakarian, Paulo 1980- (DE-588)1234085496 aut Shakarian, Jana 1977- (DE-588)1234085062 aut Nunes, Eric (DE-588)1167978951 aut Sarkar, Soumajyoti 1992- (DE-588)1234084449 aut Erscheint auch als Druck-Ausgabe 978-1-108-49159-4 https://doi.org/10.1017/9781108869003 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Marin, Ericsson Almukaynizi, Mohammed 1987- Shakarian, Paulo 1980- Shakarian, Jana 1977- Nunes, Eric Sarkar, Soumajyoti 1992- Exploring malicious hacker communities toward proactive cyber defence Cyber intelligence (Computer security) Cyberterrorism / Prevention Hacking / Prevention Data mining Social sciences / Network analysis Hackers / Social networks |
title | Exploring malicious hacker communities toward proactive cyber defence |
title_auth | Exploring malicious hacker communities toward proactive cyber defence |
title_exact_search | Exploring malicious hacker communities toward proactive cyber defence |
title_exact_search_txtP | Exploring malicious hacker communities toward proactive cyber defence |
title_full | Exploring malicious hacker communities toward proactive cyber defence Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian ; foreword by Edward G. Amoroso |
title_fullStr | Exploring malicious hacker communities toward proactive cyber defence Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian ; foreword by Edward G. Amoroso |
title_full_unstemmed | Exploring malicious hacker communities toward proactive cyber defence Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian ; foreword by Edward G. Amoroso |
title_short | Exploring malicious hacker communities |
title_sort | exploring malicious hacker communities toward proactive cyber defence |
title_sub | toward proactive cyber defence |
topic | Cyber intelligence (Computer security) Cyberterrorism / Prevention Hacking / Prevention Data mining Social sciences / Network analysis Hackers / Social networks |
topic_facet | Cyber intelligence (Computer security) Cyberterrorism / Prevention Hacking / Prevention Data mining Social sciences / Network analysis Hackers / Social networks |
url | https://doi.org/10.1017/9781108869003 |
work_keys_str_mv | AT marinericsson exploringmalicioushackercommunitiestowardproactivecyberdefence AT almukaynizimohammed exploringmalicioushackercommunitiestowardproactivecyberdefence AT shakarianpaulo exploringmalicioushackercommunitiestowardproactivecyberdefence AT shakarianjana exploringmalicioushackercommunitiestowardproactivecyberdefence AT nuneseric exploringmalicioushackercommunitiestowardproactivecyberdefence AT sarkarsoumajyoti exploringmalicioushackercommunitiestowardproactivecyberdefence |