The Art of Cyber Defense: From Risk Assessment to Threat Intelligence
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricac...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton
Taylor & Francis
2024
|
Schriftenreihe: | Advances in Cybersecurity Management
|
Schlagworte: | |
Zusammenfassung: | The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures.Delving into the nuances of modern cyber threats, this book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber-attacks.This book offers comprehensive coverage of the most essential topics, including:- Advanced malware detection and prevention strategies leveraging artificial intelligence (AI)- Hybrid deep learning techniques for malware classification- Machine learning solutions and research perspectives on Internet of Services (IoT) security- Comprehensive analysis of blockchain techniques for enhancing IoT security and privacy- Practical approaches to integrating security analysis modules for proactive threat intelligenceThis book is an essential reference for students, researchers, cybersecurity professionals, and anyone interested in understanding and addressing contemporary cyber defense and risk assessment challenges. It provides a valuable resource for enhancing cybersecurity awareness, knowledge, and practical skills |
Beschreibung: | Part I: Foundations of Cyber Defense and Risk Assessment; Chapter 1: AI-Powered Strategies for Advanced Malware Detection and Prevention; Chapter 2: Advancing Malware Classification with Hybrid Deep Learning; Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things; Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and Research Perspectives; Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and Privacy: A Comprehensive Analysis; Part II: Analyzing and Responding to Emerging Threats; Chapter 6: Integrating Security Analysis Module for Proactive Threat Intelligence; Chapter 7: Security Study of Web Applications through a White Box Audit Approach: A Case Study; Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security Study of Web Applications; Chapter 9: Security in Cloud-Based IoT: A Survey; Chapter 10: Exploring IoT penetration testing: From fundamentals to practical setup; Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol; Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning; Chapter 13: An adaptive cybersecurity strategy based on game theory to manage emerging threats In The SDN Infrastructure; Part III: Human-Centric Risk Mitigation Approaches; Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation; Chapter 15: Human Factors in Cyber Defense; Chapter 16: Security Operation Center: Towards A Maturity Model |
Beschreibung: | 310 Seiten 730 gr |
ISBN: | 9781032714783 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV050033743 | ||
003 | DE-604 | ||
007 | t| | ||
008 | 241119s2024 xx |||| 00||| eng d | ||
020 | |a 9781032714783 |9 978-1-03-271478-3 | ||
024 | 3 | |a 9781032714783 | |
035 | |a (DE-599)BVBBV050033743 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
100 | 1 | |a Baddi, Youssef |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Art of Cyber Defense |b From Risk Assessment to Threat Intelligence |
264 | 1 | |a Boca Raton |b Taylor & Francis |c 2024 | |
300 | |a 310 Seiten |c 730 gr | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Advances in Cybersecurity Management | |
500 | |a Part I: Foundations of Cyber Defense and Risk Assessment; Chapter 1: AI-Powered Strategies for Advanced Malware Detection and Prevention; Chapter 2: Advancing Malware Classification with Hybrid Deep Learning; Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things; Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and Research Perspectives; Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and Privacy: A Comprehensive Analysis; Part II: Analyzing and Responding to Emerging Threats; Chapter 6: Integrating Security Analysis Module for Proactive Threat Intelligence; Chapter 7: Security Study of Web Applications through a White Box Audit Approach: A Case Study; Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security Study of Web Applications; Chapter 9: Security in Cloud-Based IoT: A Survey; Chapter 10: Exploring IoT penetration testing: From fundamentals to practical setup; Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol; Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning; Chapter 13: An adaptive cybersecurity strategy based on game theory to manage emerging threats In The SDN Infrastructure; Part III: Human-Centric Risk Mitigation Approaches; Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation; Chapter 15: Human Factors in Cyber Defense; Chapter 16: Security Operation Center: Towards A Maturity Model | ||
520 | |a The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures.Delving into the nuances of modern cyber threats, this book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber-attacks.This book offers comprehensive coverage of the most essential topics, including:- Advanced malware detection and prevention strategies leveraging artificial intelligence (AI)- Hybrid deep learning techniques for malware classification- Machine learning solutions and research perspectives on Internet of Services (IoT) security- Comprehensive analysis of blockchain techniques for enhancing IoT security and privacy- Practical approaches to integrating security analysis modules for proactive threat intelligenceThis book is an essential reference for students, researchers, cybersecurity professionals, and anyone interested in understanding and addressing contemporary cyber defense and risk assessment challenges. It provides a valuable resource for enhancing cybersecurity awareness, knowledge, and practical skills | ||
650 | 4 | |a bicssc / Privacy & data protection | |
650 | 4 | |a bicssc / Coding theory & cryptology | |
650 | 4 | |a bicssc / Forensic science | |
650 | 4 | |a bicssc / Legal aspects of IT | |
650 | 4 | |a bicssc / Computer architecture & logic design | |
650 | 4 | |a bicssc / Computer networking & communications | |
650 | 4 | |a bicssc / Security services | |
650 | 4 | |a bicssc / Criminology - legal aspects | |
650 | 4 | |a bicssc / Causes & prevention of crime | |
650 | 4 | |a bisacsh / COMPUTERS / Security / Viruses & Malware | |
650 | 4 | |a bisacsh / COMPUTERS / Security / Cryptography & Encryption | |
650 | 4 | |a bisacsh / COMPUTERS / Internet / Online Safety & Privacy | |
650 | 4 | |a bisacsh / COMPUTERS / Security / General | |
700 | 1 | |a Almaiah, Mohammed Amin |e Sonstige |4 oth | |
700 | 1 | |a Almomani, Omar |e Sonstige |4 oth | |
700 | 1 | |a Maleh, Yassine |e Sonstige |4 oth | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035371627 |
Datensatz im Suchindex
_version_ | 1816193622585901056 |
---|---|
adam_text | |
any_adam_object | |
author | Baddi, Youssef |
author_facet | Baddi, Youssef |
author_role | aut |
author_sort | Baddi, Youssef |
author_variant | y b yb |
building | Verbundindex |
bvnumber | BV050033743 |
ctrlnum | (DE-599)BVBBV050033743 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV050033743</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241119s2024 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032714783</subfield><subfield code="9">978-1-03-271478-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781032714783</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050033743</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Baddi, Youssef</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Art of Cyber Defense</subfield><subfield code="b">From Risk Assessment to Threat Intelligence</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">Taylor & Francis</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">310 Seiten</subfield><subfield code="c">730 gr</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Cybersecurity Management</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Part I: Foundations of Cyber Defense and Risk Assessment; Chapter 1: AI-Powered Strategies for Advanced Malware Detection and Prevention; Chapter 2: Advancing Malware Classification with Hybrid Deep Learning; Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things; Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and Research Perspectives; Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and Privacy: A Comprehensive Analysis; Part II: Analyzing and Responding to Emerging Threats; Chapter 6: Integrating Security Analysis Module for Proactive Threat Intelligence; Chapter 7: Security Study of Web Applications through a White Box Audit Approach: A Case Study; Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security Study of Web Applications; Chapter 9: Security in Cloud-Based IoT: A Survey; Chapter 10: Exploring IoT penetration testing: From fundamentals to practical setup; Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol; Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning; Chapter 13: An adaptive cybersecurity strategy based on game theory to manage emerging threats In The SDN Infrastructure; Part III: Human-Centric Risk Mitigation Approaches; Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation; Chapter 15: Human Factors in Cyber Defense; Chapter 16: Security Operation Center: Towards A Maturity Model</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures.Delving into the nuances of modern cyber threats, this book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber-attacks.This book offers comprehensive coverage of the most essential topics, including:- Advanced malware detection and prevention strategies leveraging artificial intelligence (AI)- Hybrid deep learning techniques for malware classification- Machine learning solutions and research perspectives on Internet of Services (IoT) security- Comprehensive analysis of blockchain techniques for enhancing IoT security and privacy- Practical approaches to integrating security analysis modules for proactive threat intelligenceThis book is an essential reference for students, researchers, cybersecurity professionals, and anyone interested in understanding and addressing contemporary cyber defense and risk assessment challenges. It provides a valuable resource for enhancing cybersecurity awareness, knowledge, and practical skills</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Privacy & data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Coding theory & cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Forensic science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Legal aspects of IT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer architecture & logic design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer networking & communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Security services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Criminology - legal aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Causes & prevention of crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / Viruses & Malware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / Cryptography & Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Internet / Online Safety & Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / General</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Almaiah, Mohammed Amin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Almomani, Omar</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maleh, Yassine</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035371627</subfield></datafield></record></collection> |
id | DE-604.BV050033743 |
illustrated | Not Illustrated |
indexdate | 2024-11-19T23:00:11Z |
institution | BVB |
isbn | 9781032714783 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035371627 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | 310 Seiten 730 gr |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Taylor & Francis |
record_format | marc |
series2 | Advances in Cybersecurity Management |
spelling | Baddi, Youssef Verfasser aut The Art of Cyber Defense From Risk Assessment to Threat Intelligence Boca Raton Taylor & Francis 2024 310 Seiten 730 gr txt rdacontent n rdamedia nc rdacarrier Advances in Cybersecurity Management Part I: Foundations of Cyber Defense and Risk Assessment; Chapter 1: AI-Powered Strategies for Advanced Malware Detection and Prevention; Chapter 2: Advancing Malware Classification with Hybrid Deep Learning; Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things; Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and Research Perspectives; Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and Privacy: A Comprehensive Analysis; Part II: Analyzing and Responding to Emerging Threats; Chapter 6: Integrating Security Analysis Module for Proactive Threat Intelligence; Chapter 7: Security Study of Web Applications through a White Box Audit Approach: A Case Study; Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security Study of Web Applications; Chapter 9: Security in Cloud-Based IoT: A Survey; Chapter 10: Exploring IoT penetration testing: From fundamentals to practical setup; Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol; Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning; Chapter 13: An adaptive cybersecurity strategy based on game theory to manage emerging threats In The SDN Infrastructure; Part III: Human-Centric Risk Mitigation Approaches; Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation; Chapter 15: Human Factors in Cyber Defense; Chapter 16: Security Operation Center: Towards A Maturity Model The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures.Delving into the nuances of modern cyber threats, this book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber-attacks.This book offers comprehensive coverage of the most essential topics, including:- Advanced malware detection and prevention strategies leveraging artificial intelligence (AI)- Hybrid deep learning techniques for malware classification- Machine learning solutions and research perspectives on Internet of Services (IoT) security- Comprehensive analysis of blockchain techniques for enhancing IoT security and privacy- Practical approaches to integrating security analysis modules for proactive threat intelligenceThis book is an essential reference for students, researchers, cybersecurity professionals, and anyone interested in understanding and addressing contemporary cyber defense and risk assessment challenges. It provides a valuable resource for enhancing cybersecurity awareness, knowledge, and practical skills bicssc / Privacy & data protection bicssc / Coding theory & cryptology bicssc / Forensic science bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Security services bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Security / Viruses & Malware bisacsh / COMPUTERS / Security / Cryptography & Encryption bisacsh / COMPUTERS / Internet / Online Safety & Privacy bisacsh / COMPUTERS / Security / General Almaiah, Mohammed Amin Sonstige oth Almomani, Omar Sonstige oth Maleh, Yassine Sonstige oth |
spellingShingle | Baddi, Youssef The Art of Cyber Defense From Risk Assessment to Threat Intelligence bicssc / Privacy & data protection bicssc / Coding theory & cryptology bicssc / Forensic science bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Security services bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Security / Viruses & Malware bisacsh / COMPUTERS / Security / Cryptography & Encryption bisacsh / COMPUTERS / Internet / Online Safety & Privacy bisacsh / COMPUTERS / Security / General |
title | The Art of Cyber Defense From Risk Assessment to Threat Intelligence |
title_auth | The Art of Cyber Defense From Risk Assessment to Threat Intelligence |
title_exact_search | The Art of Cyber Defense From Risk Assessment to Threat Intelligence |
title_full | The Art of Cyber Defense From Risk Assessment to Threat Intelligence |
title_fullStr | The Art of Cyber Defense From Risk Assessment to Threat Intelligence |
title_full_unstemmed | The Art of Cyber Defense From Risk Assessment to Threat Intelligence |
title_short | The Art of Cyber Defense |
title_sort | the art of cyber defense from risk assessment to threat intelligence |
title_sub | From Risk Assessment to Threat Intelligence |
topic | bicssc / Privacy & data protection bicssc / Coding theory & cryptology bicssc / Forensic science bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Security services bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Security / Viruses & Malware bisacsh / COMPUTERS / Security / Cryptography & Encryption bisacsh / COMPUTERS / Internet / Online Safety & Privacy bisacsh / COMPUTERS / Security / General |
topic_facet | bicssc / Privacy & data protection bicssc / Coding theory & cryptology bicssc / Forensic science bicssc / Legal aspects of IT bicssc / Computer architecture & logic design bicssc / Computer networking & communications bicssc / Security services bicssc / Criminology - legal aspects bicssc / Causes & prevention of crime bisacsh / COMPUTERS / Security / Viruses & Malware bisacsh / COMPUTERS / Security / Cryptography & Encryption bisacsh / COMPUTERS / Internet / Online Safety & Privacy bisacsh / COMPUTERS / Security / General |
work_keys_str_mv | AT baddiyoussef theartofcyberdefensefromriskassessmenttothreatintelligence AT almaiahmohammedamin theartofcyberdefensefromriskassessmenttothreatintelligence AT almomaniomar theartofcyberdefensefromriskassessmenttothreatintelligence AT malehyassine theartofcyberdefensefromriskassessmenttothreatintelligence |