Search preferences
Direkt zu den wichtigsten Suchergebnissen

Suchfilter

Produktart

  • Alle Product Types 
  • Bücher (30)
  • Magazine & Zeitschriften (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Comics (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Noten (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Kunst, Grafik & Poster (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Fotografien (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Karten (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Manuskripte & Papierantiquitäten (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)

Weitere Eigenschaften

  • Erstausgabe (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Signiert (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Schutzumschlag (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Angebotsfoto (10)

Sprache (1)

Preis

Benutzerdefinierte Preisspanne (EUR)

Land des Verkäufers

  • Unbekannt

    Verlag: Springer International Publishing, 2019

    ISBN 10: 3030105423 ISBN 13: 9783030105426

    Sprache: Englisch

    Anbieter: Buchpark, Trebbin, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Kostenlos für den Versand innerhalb von/der Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: 2 verfügbar

    In den Warenkorb

    Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 396 | Sprache: Englisch | Produktart: Bücher.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Hardcover

  • Kim-Kwang Raymond Choo

    Verlag: SYNGRESS MEDIA, 2016

    ISBN 10: 0128053038 ISBN 13: 9780128053034

    Sprache: Englisch

    Anbieter: Buchpark, Trebbin, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Kostenlos für den Versand innerhalb von/der Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: 1 verfügbar

    In den Warenkorb

    Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Softcover

  • Zheng Xu

    Verlag: Springer International Publishing, Springer International Publishing, 2019

    ISBN 10: 3030152340 ISBN 13: 9783030152345

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Kostenlos für den Versand innerhalb von/der Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: 1 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents the outcomes of the 2019 International Conference on Cyber Security Intelligence and Analytics (CSIA2019), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cyber crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of Cyber Security Intelligence and Analytics.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Softcover

  • Verlag: Springer, 2022

    ISBN 10: 3030747557 ISBN 13: 9783030747558

    Sprache: Englisch

    Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 5,94 für den Versand von Vereinigtes Königreich nach Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: Mehr als 20 verfügbar

    In den Warenkorb

    Zustand: New. In.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Softcover

  • Verlag: Springer, 2019

    ISBN 10: 303008891X ISBN 13: 9783030088910

    Sprache: Englisch

    Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 5,94 für den Versand von Vereinigtes Königreich nach Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: Mehr als 20 verfügbar

    In den Warenkorb

    Zustand: New. In.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Softcover

  • Ali Dehghantanha

    Verlag: Springer International Publishing, Springer Nature Switzerland, 2018

    ISBN 10: 3319739506 ISBN 13: 9783319739502

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Kostenlos für den Versand innerhalb von/der Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: 1 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgroundsin artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Hardcover

  • Kim-Kwang Raymond Choo

    Verlag: Springer International Publishing, Springer International Publishing, 2021

    ISBN 10: 3030381838 ISBN 13: 9783030381837

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Kostenlos für den Versand innerhalb von/der Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: 1 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace.Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data.Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to:Blockchain-based authentication, authorization and accounting mechanismsApplications of blockchain technologies in digital forensic and threat huntingBlockchain-based threat intelligence and threat analytics techniquesFormal specification of smart contractsAutomated tools for outsmarting smart contractsSecurity and privacy aspects of blockchain technologiesVulnerabilities of smart contractsBlockchain for securing cyber infrastructure and internet of things networksBlockchain-based cybersecurity education systemsThis book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data willfind this book useful as well.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Softcover

  • Kim-Kwang Raymond Choo

    Verlag: Springer International Publishing, 2020

    ISBN 10: 3030381803 ISBN 13: 9783030381806

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Kostenlos für den Versand innerhalb von/der Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: 1 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace.Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data.Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to:Blockchain-based authentication, authorization and accounting mechanismsApplications of blockchain technologies in digital forensic and threat huntingBlockchain-based threat intelligence and threat analytics techniquesFormal specification of smart contractsAutomated tools for outsmarting smart contractsSecurity and privacy aspects of blockchain technologiesVulnerabilities of smart contractsBlockchain for securing cyber infrastructure and internet of things networksBlockchain-based cybersecurity education systemsThis book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data willfind this book useful as well.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Hardcover

  • Ali Dehghantanha

    Verlag: Springer International Publishing, 2021

    ISBN 10: 3030747522 ISBN 13: 9783030747527

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Kostenlos für den Versand innerhalb von/der Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: 1 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). Theauthorspropose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposesa robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in thesixthchapter. Theauthorsevaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated.This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. Theauthorsdemonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well asa proposedclustering approach to detect IoT malware in the last two chapters.This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Hardcover

  • Ali Dehghantanha

    Verlag: Springer International Publishing, 2021

    ISBN 10: 3030385590 ISBN 13: 9783030385590

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Kostenlos für den Versand innerhalb von/der Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: 1 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook.The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments.This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Softcover

  • Ali Dehghantanha

    Verlag: Springer International Publishing, 2020

    ISBN 10: 3030385566 ISBN 13: 9783030385569

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Kostenlos für den Versand innerhalb von/der Deutschland

    Versandziele, Kosten & Dauer

    Anzahl: 1 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook.The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments.This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.


    Mehr Angebote von anderen Verkäufern bei ZVAB

    Mehr entdecken Hardcover