<P></P><P>THIS TEXTBOOK SURVEYS THE KNOWLEDGE BASE IN AUTOMATED AND&NBSP;RESILIENT CYBER DECEPTION. IT FEATURES FOUR MAJOR PARTS: CYBER DECEPTION&NBSP;REASONING FRAMEWORKS, DYNAMIC DECISION-MAKING FOR CYBER DECEPTION,&NBSP;NETWORK-BASED DECEPTION, AND MALWARE DECEPTION.</P><P>&NBSP;AN IMPORTANT DISTINGUISHING CHARACTERISTIC OF THIS BOOK IS ITS INCLUSION OF&NBSP;STUDENT EXERCISES AT THE END OF EACH CHAPTER. EXERCISES INCLUDE TECHNICAL&NBSP;PROBLEMS, SHORT-ANSWER DISCUSSION QUESTIONS, OR HANDS-ON LAB EXERCISES,&NBSP;ORGANIZED AT A RANGE OF DIFFICULTIES FROM EASY TO ADVANCED,.</P><P>&NBSP;THIS IS A USEFUL TEXTBOOK FOR A WIDE RANGE OF CLASSES AND DEGREE LEVELS WITHIN&NBSP;THE SECURITY ARENA AND OTHER RELATED TOPICS. IT’S ALSO SUITABLE FOR&NBSP;RESEARCHERS AND PRACTITIONERS WITH A VARIETY OF CYBER SECURITY BACKGROUNDS FROM NOVICE TO&NBSP;EXPERIENCED.</P><P></P>
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.
An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.
This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.