Search preferences
Direkt zu den wichtigsten Suchergebnissen

Suchfilter

Produktart

  • Alle Product Types 
  • Bücher (41)
  • Magazine & Zeitschriften (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Comics (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Noten (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Kunst, Grafik & Poster (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Fotografien (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Karten (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Manuskripte & Papierantiquitäten (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)

Zustand Mehr dazu

Weitere Eigenschaften

  • Erstausgabe (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Signiert (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Schutzumschlag (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Angebotsfoto (25)

Sprache (1)

Preis

Benutzerdefinierte Preisspanne (EUR)

Gratisversand

  • Kostenloser Versand nach USA (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)

Land des Verkäufers

  • Buch 3 von 9: Science, Technology, and Management

    Dehghantanha, Ali et al. (Eds.)

    Verlag: Cham, Springer., 2019

    ISBN 10: 3030105423 ISBN 13: 9783030105426

    Sprache: Englisch

    Anbieter: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Deutschland

    Verbandsmitglied: GIAQ ILAB VDA

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 18,00

    EUR 30,00 für den Versand von Deutschland nach USA

    Anzahl: 6 verfügbar

    In den Warenkorb

    IX, 384 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Sprache: Englisch.

  • Buch 257 von 540: Advances in Intelligent Systems and Computing

    Hammoudeh, Mohammad

    Verlag: Springer, 2019

    ISBN 10: 3030152340 ISBN 13: 9783030152345

    Sprache: Englisch

    Anbieter: Brook Bookstore, Milano, MI, Italien

    Verkäuferbewertung 4 von 5 Sternen 4 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 81,51

    EUR 8,00 für den Versand von Italien nach USA

    Anzahl: 5 verfügbar

    In den Warenkorb

    Zustand: new.

  • Ali Dehghantanha

    Verlag: LAP LAMBERT Academic Publishing Jun 2010, 2010

    ISBN 10: 3838369297 ISBN 13: 9783838369297

    Sprache: Englisch

    Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 59,00

    EUR 60,00 für den Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Neuware -The years coming promise to bring new area of information technology, transferring it from scientists minds into reality, on one hand a new paradigm known as pervasive calm, ubiquitous computing, or pervasive computing has the ability to overcome a lot of inefficiencies of the current information systems while on the other hand central blocks of pervasive computing are in direct conflicts with privacy protection fundamentals. This book reviews current issues in identity, location, and time privacy in pervasive computing systems and evaluates existing privacy models. Finally it describes a privacy model that provides user control over identity, time, and location. The book offers interesting evaluation methods for user control over private information, unobtrusiveness of privacy policies, and privacy models scalability.Books on Demand GmbH, Überseering 33, 22297 Hamburg 136 pp. Englisch.

  • Ali Dehghantanha

    Verlag: LAP LAMBERT Academic Publishing, 2010

    ISBN 10: 3838369297 ISBN 13: 9783838369297

    Sprache: Englisch

    Anbieter: preigu, Osnabrück, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 51,65

    EUR 70,00 für den Versand von Deutschland nach USA

    Anzahl: 5 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Privacy in Pervasive Computing Systems | Investigating identity, location, and time privacy in ubiquitous computing systems | Ali Dehghantanha | Taschenbuch | 136 S. | Englisch | 2010 | LAP LAMBERT Academic Publishing | EAN 9783838369297 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.

  • Ali Dehghantanha

    Verlag: LAP LAMBERT Academic Publishing, 2011

    ISBN 10: 3847318241 ISBN 13: 9783847318248

    Sprache: Englisch

    Anbieter: preigu, Osnabrück, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 67,05

    EUR 70,00 für den Versand von Deutschland nach USA

    Anzahl: 5 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Formal Methods for Analyzing Privacy Policies | Techniques for Formal Representing, Analyzing, and Processing Privacy Policies | Ali Dehghantanha | Taschenbuch | 300 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783847318248 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.

  • Ali Dehghantanha

    Verlag: LAP LAMBERT Academic Publishing Dez 2011, 2011

    ISBN 10: 3847318241 ISBN 13: 9783847318248

    Sprache: Englisch

    Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 79,00

    EUR 60,00 für den Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Neuware -With the fast spread of the online services and the huge growth in the collection of users¿ private data, there is a growing interest both by governments and enterprises to establish rules and policies for collecting, processing, and storing users¿ private data. These somewhat informally written privacy policies must be interpreted carefully in the software interface. To better interpret and analyze privacy policies, we need a language suited to the structure of the privacy policies, capable of supporting privacy policies designing methods like referencing to different locations of the policy text. Another issue of growing interest is exploring the compliance of enterprise designed privacy policies with legal privacy policies, or comparing and contrasting the current policies and checking their proper enforcement. Therefore, there is a need for languages that enable automatic exploration of properties with mechanisms for formally contrasting and comparing privacy policies. This book reviews formal methods application in analyzing privacy policies and investigate their potential to address the above mentioned issues.Books on Demand GmbH, Überseering 33, 22297 Hamburg 300 pp. Englisch.

  • Buch 3 von 9: Science, Technology, and Management

    Verlag: Springer, 2019

    ISBN 10: 3030105423 ISBN 13: 9783030105426

    Sprache: Englisch

    Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich

    Verkäuferbewertung 4 von 5 Sternen 4 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 140,10

    EUR 7,40 für den Versand von Vereinigtes Königreich nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Zustand: New.

  • Buch 71 von 90: Advances in Information Security

    Ali Dehghantanha

    Verlag: Springer, 2018

    ISBN 10: 3319739506 ISBN 13: 9783319739502

    Sprache: Englisch

    Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 143,61

    EUR 5,71 für den Versand von Vereinigtes Königreich nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    HRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000.

  • Kim-Kwang Raymond Choo

    Verlag: SYNGRESS MEDIA, 2016

    ISBN 10: 0128053038 ISBN 13: 9780128053034

    Sprache: Englisch

    Anbieter: Buchpark, Trebbin, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 58,59

    EUR 105,00 für den Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher.

  • Buch 257 von 540: Advances in Intelligent Systems and Computing

    Zheng Xu (u. a.)

    Verlag: Springer International Publishing, 2019

    ISBN 10: 3030152340 ISBN 13: 9783030152345

    Sprache: Englisch

    Anbieter: preigu, Osnabrück, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 96,40

    EUR 70,00 für den Versand von Deutschland nach USA

    Anzahl: 5 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Cyber Security Intelligence and Analytics | Zheng Xu (u. a.) | Taschenbuch | 2 Taschenbücher | Englisch | 2019 | Springer International Publishing | EAN 9783030152345 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.

  • Buch 257 von 540: Advances in Intelligent Systems and Computing

    Zheng Xu

    Verlag: Springer International Publishing, Springer International Publishing Apr 2019, 2019

    ISBN 10: 3030152340 ISBN 13: 9783030152345

    Sprache: Englisch

    Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 106,99

    EUR 60,00 für den Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Neuware -This book presents the outcomes of the 2019 International Conference on Cyber Security Intelligence and Analytics (CSIA2019), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cyber crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of Cyber Security Intelligence and Analytics.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 1508 pp. Englisch.

  • Buch 257 von 540: Advances in Intelligent Systems and Computing

    Zheng Xu

    Verlag: Springer International Publishing, Springer International Publishing, 2019

    ISBN 10: 3030152340 ISBN 13: 9783030152345

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 106,99

    EUR 71,21 für den Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents the outcomes of the 2019 International Conference on Cyber Security Intelligence and Analytics (CSIA2019), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cyber crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of Cyber Security Intelligence and Analytics.

  • EUR 171,10

    EUR 17,07 für den Versand von Vereinigtes Königreich nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Paperback. Zustand: Brand New. 1453 pages. 9.25x6.10x1.61 inches. In Stock.

  • Buch 3 von 9: Science, Technology, and Management

    Unbekannt

    Verlag: Springer International Publishing, 2019

    ISBN 10: 3030105423 ISBN 13: 9783030105426

    Sprache: Englisch

    Anbieter: Buchpark, Trebbin, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 84,31

    EUR 105,00 für den Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher.

  • Unbekannt

    Verlag: Springer International Publishing, 2022

    ISBN 10: 3030747557 ISBN 13: 9783030747558

    Sprache: Englisch

    Anbieter: Buchpark, Trebbin, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 107,69

    EUR 105,00 für den Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Zustand: Gut. Zustand: Gut | Sprache: Englisch | Produktart: Bücher.

  • Bild des Verkäufers für Cyber Threat Intelligence zum Verkauf von preigu

    Buch 71 von 90: Advances in Information Security

    Ali Dehghantanha (u. a.)

    Verlag: Springer, 2019

    ISBN 10: 303008891X ISBN 13: 9783030088910

    Sprache: Englisch

    Anbieter: preigu, Osnabrück, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 151,00

    EUR 70,00 für den Versand von Deutschland nach USA

    Anzahl: 5 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Cyber Threat Intelligence | Ali Dehghantanha (u. a.) | Taschenbuch | vi | Englisch | 2019 | Springer | EAN 9783030088910 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.

  • Bild des Verkäufers für Blockchain Cybersecurity, Trust and Privacy zum Verkauf von preigu

    Buch 80 von 90: Advances in Information Security

    Kim-Kwang Raymond Choo (u. a.)

    Verlag: Springer International Publishing, 2021

    ISBN 10: 3030381838 ISBN 13: 9783030381837

    Sprache: Englisch

    Anbieter: preigu, Osnabrück, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 160,10

    EUR 70,00 für den Versand von Deutschland nach USA

    Anzahl: 5 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Blockchain Cybersecurity, Trust and Privacy | Kim-Kwang Raymond Choo (u. a.) | Taschenbuch | vi | Englisch | 2021 | Springer International Publishing | EAN 9783030381837 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.

  • Buch 71 von 90: Advances in Information Security

    Ali Dehghantanha

    Verlag: Springer International Publishing, Springer Nature Switzerland Feb 2019, 2019

    ISBN 10: 303008891X ISBN 13: 9783030088910

    Sprache: Englisch

    Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 171,19

    EUR 60,00 für den Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Neuware -This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions ¿ this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works.The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgroundsin artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 340 pp. Englisch.

  • Buch 71 von 90: Advances in Information Security

    Ali Dehghantanha

    Verlag: Springer International Publishing, Springer International Publishing Mai 2018, 2018

    ISBN 10: 3319739506 ISBN 13: 9783319739502

    Sprache: Englisch

    Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 171,19

    EUR 60,00 für den Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Neuware -This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions ¿ this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works.The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgroundsin artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 340 pp. Englisch.

  • Buch 71 von 90: Advances in Information Security

    Ali Dehghantanha

    Verlag: Springer International Publishing, Springer Nature Switzerland, 2019

    ISBN 10: 303008891X ISBN 13: 9783030088910

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 171,19

    EUR 62,59 für den Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgroundsin artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

  • Buch 71 von 90: Advances in Information Security

    Ali Dehghantanha

    Verlag: Springer International Publishing, Springer Nature Switzerland, 2018

    ISBN 10: 3319739506 ISBN 13: 9783319739502

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 171,19

    EUR 63,38 für den Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgroundsin artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

  • Bild des Verkäufers für Handbook of Big Data Privacy zum Verkauf von preigu

    Ali Dehghantanha (u. a.)

    Verlag: Springer International Publishing, 2021

    ISBN 10: 3030385590 ISBN 13: 9783030385590

    Sprache: Englisch

    Anbieter: preigu, Osnabrück, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 169,20

    EUR 70,00 für den Versand von Deutschland nach USA

    Anzahl: 5 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Handbook of Big Data Privacy | Ali Dehghantanha (u. a.) | Taschenbuch | ix | Englisch | 2021 | Springer International Publishing | EAN 9783030385590 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.

  • Bild des Verkäufers für Handbook of Big Data Analytics and Forensics zum Verkauf von preigu

    Ali Dehghantanha (u. a.)

    Verlag: Springer Nature Switzerland, 2022

    ISBN 10: 3030747557 ISBN 13: 9783030747558

    Sprache: Englisch

    Anbieter: preigu, Osnabrück, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 169,20

    EUR 70,00 für den Versand von Deutschland nach USA

    Anzahl: 5 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Handbook of Big Data Analytics and Forensics | Ali Dehghantanha (u. a.) | Taschenbuch | viii | Englisch | 2022 | Springer Nature Switzerland | EAN 9783030747558 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.

  • Buch 80 von 90: Advances in Information Security

    Kim-Kwang Raymond Choo

    Verlag: Springer International Publishing, Springer International Publishing Mär 2020, 2020

    ISBN 10: 3030381803 ISBN 13: 9783030381806

    Sprache: Englisch

    Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 181,89

    EUR 60,00 für den Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Neuware -¿This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace.Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data.Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP¿s issues in the digital world. Topics of interest for this book include but not limited to:Blockchain-based authentication, authorization and accounting mechanismsApplications of blockchain technologies in digital forensic and threat huntingBlockchain-based threat intelligence and threat analytics techniquesFormal specification of smart contractsAutomated tools for outsmarting smart contractsSecurity and privacy aspects of blockchain technologiesVulnerabilities of smart contractsBlockchain for securing cyber infrastructure and internet of things networksBlockchain-based cybersecurity education systemsThis book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data willfind this book useful as well.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 296 pp. Englisch.

  • Buch 80 von 90: Advances in Information Security

    Kim-Kwang Raymond Choo

    Verlag: Springer International Publishing, 2020

    ISBN 10: 3030381803 ISBN 13: 9783030381806

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 181,89

    EUR 63,06 für den Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace.Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data.Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to:Blockchain-based authentication, authorization and accounting mechanismsApplications of blockchain technologies in digital forensic and threat huntingBlockchain-based threat intelligence and threat analytics techniquesFormal specification of smart contractsAutomated tools for outsmarting smart contractsSecurity and privacy aspects of blockchain technologiesVulnerabilities of smart contractsBlockchain for securing cyber infrastructure and internet of things networksBlockchain-based cybersecurity education systemsThis book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data willfind this book useful as well.

  • Buch 80 von 90: Advances in Information Security

    Kim-Kwang Raymond Choo

    Verlag: Springer International Publishing, Springer International Publishing, 2021

    ISBN 10: 3030381838 ISBN 13: 9783030381837

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 181,89

    EUR 62,26 für den Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace.Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data.Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to:Blockchain-based authentication, authorization and accounting mechanismsApplications of blockchain technologies in digital forensic and threat huntingBlockchain-based threat intelligence and threat analytics techniquesFormal specification of smart contractsAutomated tools for outsmarting smart contractsSecurity and privacy aspects of blockchain technologiesVulnerabilities of smart contractsBlockchain for securing cyber infrastructure and internet of things networksBlockchain-based cybersecurity education systemsThis book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data willfind this book useful as well.

  • Ali Dehghantanha

    Verlag: Springer International Publishing, Springer International Publishing Mär 2021, 2021

    ISBN 10: 3030385590 ISBN 13: 9783030385590

    Sprache: Englisch

    Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 192,59

    EUR 60,00 für den Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Neuware -This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 408 pp. Englisch.

  • Ali Dehghantanha

    Verlag: Springer International Publishing, Springer Nature Switzerland Dez 2021, 2021

    ISBN 10: 3030747522 ISBN 13: 9783030747527

    Sprache: Englisch

    Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 192,59

    EUR 60,00 für den Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Neuware -This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process cloud¿s log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter.The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS¿s cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS¿s cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated.This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters.This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 296 pp. Englisch.

  • Ali Dehghantanha

    Verlag: Springer International Publishing, 2022

    ISBN 10: 3030747557 ISBN 13: 9783030747558

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 192,59

    EUR 62,26 für den Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). Theauthorspropose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposesa robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in thesixthchapter. Theauthorsevaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated.This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. Theauthorsdemonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well asa proposedclustering approach to detect IoT malware in the last two chapters.This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.

  • Ali Dehghantanha

    Verlag: Springer International Publishing, 2021

    ISBN 10: 3030385590 ISBN 13: 9783030385590

    Sprache: Englisch

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 192,59

    EUR 63,08 für den Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook.The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments.This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.