Spies in the Bits and Bytes - Ali, Atif; Bhatti, Baber Majid; - Prospero Internet Bookshop

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
 
Product details:

ISBN13:9781032821092
ISBN10:1032821094
Binding:Hardback
No. of pages:286 pages
Size:254x178 mm
Weight:689 g
Language:English
Illustrations: 10 Illustrations, black & white; 159 Illustrations, color; 10 Halftones, black & white; 127 Halftones, color; 32 Line drawings, color; 7 Tables, black & white
681
Category:

Spies in the Bits and Bytes

The Art of Cyber Threat Intelligence
 
Edition number: 1
Publisher: CRC Press
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 110.00
Estimated price in HUF:
57 750 HUF (55 000 HUF + 5% VAT)
Why estimated?
 
Your price:

51 975 (49 500 HUF + 5% VAT )
discount is: 10% (approx 5 775 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Can't you provide more accurate information?
 
  Piece(s)

 
Short description:

"Spies in the Bits and Bytes" offers in-depth analysis of cyber threats, cutting-edge defense strategies using AI and machine learning, real-world case studies, accessible insights, and forward-looking perspectives on the future of cyber threats and defense. This book  equips readers for the ongoing battle against digital threats.

Long description:

In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr. Atif and Dr. Baber emerges as a critical beacon of knowledge and understanding. This book delves into the shadowy world of cyber threats, unraveling the complex web of digital espionage, cybercrime, and the innovative defenses that stand between safety and digital chaos. Dr. Atif, leveraging his profound expertise in artificial intelligence and cybersecurity, offers not just an exploration but a comprehensive guide to navigating the tumultuous digital landscape. What sets this book apart is its unique blend of technical depth, real-world examples, and accessible writing, making the intricate world of cyber threats understandable and engaging for a broad audience.


Key features of Spies in the Bits and Bytes include:




  • In-depth Analysis of Cyber Threats: Unveiling the latest and most sophisticated cyber threats facing our world today.



  • Cutting-Edge Defense Strategies: Exploring the use of artificial intelligence (AI) and machine learning in crafting dynamic cyber defenses.



  • Real-World Case Studies: Providing engaging examples that illustrate the impact of cyber threats and the importance of robust cybersecurity measures.



  • Accessible Insights: Demystifying complex cybersecurity concepts for readers of all backgrounds.



  • Forward-Looking Perspectives: Offering insights into the future of cyber threats and the evolving landscape of cyber defense.


This book is an essential resource for anyone keen on understanding the intricacies of cybersecurity and the critical role it plays in our interconnected society. From cybersecurity professionals, IT students, and corporate leaders to policy makers and general readers with an interest in the digital world, Spies in the Bits and Bytes serves as a comprehensive guide to the challenges and solutions in the realm of cyber threat intelligence, preparing its audience for the ongoing battle against digital adversaries.


 

Table of Contents:
1. Unveiling the dark: Exploring cyber threats, 2. Cybercrime unmasked: A deep dive into the criminal mind, 3. Masters of defense: Harnessing AI and machine learning for cybersecurity, 4. Blockchain revolution: Fortifying the digital frontier, 5. Digital detectives: The art of incident investigation, 6. Guardians of your data: Demystifying antivirus solutions, 7. Decoding digital malice: The world of malware analysis, 8. The cyberattack odyssey: Navigating the attack lifecycle, 9. Breaching the wall: Uncovering system compromising techniques, 10. Spycraft in the digital age: Intelligence and info gathering, 11. Cyber hunt or be hunted: The art of credential hunting, 12. The climb to control: Escalation of privileges unveiled, 13. Eyes in the shadows: The power of cyber intelligence, 14. OSINT: Open-source intelligence, 15. Swift response, solid defense: The computer incident response process, 16. Strategies of the cyber-knights: Crafting countermeasures, 17. Rising from the ashes: The cyber recovery process, 18. The guardian?s code: Crafting a secure security policy, 19. Hunting vulnerabilities: The art of vulnerability management, 20. Unmasking the underworld: The secrets of the dark web