Spies in the Bits and Bytes - Ali, Atif; Bhatti, Baber Majid; - Prospero Internetes Könyváruház

Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
 
A termék adatai:

ISBN13:9781032823621
ISBN10:1032823623
Kötéstípus:Puhakötés
Terjedelem:286 oldal
Méret:254x178 mm
Súly:526 g
Nyelv:angol
Illusztrációk: 10 Illustrations, black & white; 159 Illustrations, color; 10 Halftones, black & white; 127 Halftones, color; 32 Line drawings, color; 7 Tables, black & white
681
Témakör:

Spies in the Bits and Bytes

The Art of Cyber Threat Intelligence
 
Kiadás sorszáma: 1
Kiadó: CRC Press
Megjelenés dátuma:
 
Normál ár:

Kiadói listaár:
GBP 44.99
Becsült forint ár:
23 619 Ft (22 495 Ft + 5% áfa)
Miért becsült?
 
Az Ön ára:

21 258 (20 246 Ft + 5% áfa )
Kedvezmény(ek): 10% (kb. 2 362 Ft)
A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
Kattintson ide a feliratkozáshoz
 
Beszerezhetőség:

Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
A Prosperónál jelenleg nincsen raktáron.
Nem tudnak pontosabbat?
 
  példányt

 
Rövid leírás:

"Spies in the Bits and Bytes" offers in-depth analysis of cyber threats, cutting-edge defense strategies using AI and machine learning, real-world case studies, accessible insights, and forward-looking perspectives on the future of cyber threats and defense. This book  equips readers for the ongoing battle against digital threats.

Hosszú leírás:

In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr. Atif and Dr. Baber emerges as a critical beacon of knowledge and understanding. This book delves into the shadowy world of cyber threats, unraveling the complex web of digital espionage, cybercrime, and the innovative defenses that stand between safety and digital chaos. Dr. Atif, leveraging his profound expertise in artificial intelligence and cybersecurity, offers not just an exploration but a comprehensive guide to navigating the tumultuous digital landscape. What sets this book apart is its unique blend of technical depth, real-world examples, and accessible writing, making the intricate world of cyber threats understandable and engaging for a broad audience.


Key features of Spies in the Bits and Bytes include:




  • In-depth Analysis of Cyber Threats: Unveiling the latest and most sophisticated cyber threats facing our world today.



  • Cutting-Edge Defense Strategies: Exploring the use of artificial intelligence (AI) and machine learning in crafting dynamic cyber defenses.



  • Real-World Case Studies: Providing engaging examples that illustrate the impact of cyber threats and the importance of robust cybersecurity measures.



  • Accessible Insights: Demystifying complex cybersecurity concepts for readers of all backgrounds.



  • Forward-Looking Perspectives: Offering insights into the future of cyber threats and the evolving landscape of cyber defense.


This book is an essential resource for anyone keen on understanding the intricacies of cybersecurity and the critical role it plays in our interconnected society. From cybersecurity professionals, IT students, and corporate leaders to policy makers and general readers with an interest in the digital world, Spies in the Bits and Bytes serves as a comprehensive guide to the challenges and solutions in the realm of cyber threat intelligence, preparing its audience for the ongoing battle against digital adversaries.


 

Tartalomjegyzék:
1. Unveiling the dark: Exploring cyber threats, 2. Cybercrime unmasked: A deep dive into the criminal mind, 3. Masters of defense: Harnessing AI and machine learning for cybersecurity, 4. Blockchain revolution: Fortifying the digital frontier, 5. Digital detectives: The art of incident investigation, 6. Guardians of your data: Demystifying antivirus solutions, 7. Decoding digital malice: The world of malware analysis, 8. The cyberattack odyssey: Navigating the attack lifecycle, 9. Breaching the wall: Uncovering system compromising techniques, 10. Spycraft in the digital age: Intelligence and info gathering, 11. Cyber hunt or be hunted: The art of credential hunting, 12. The climb to control: Escalation of privileges unveiled, 13. Eyes in the shadows: The power of cyber intelligence, 14. OSINT: Open-source intelligence, 15. Swift response, solid defense: The computer incident response process, 16. Strategies of the cyber-knights: Crafting countermeasures, 17. Rising from the ashes: The cyber recovery process, 18. The guardian?s code: Crafting a secure security policy, 19. Hunting vulnerabilities: The art of vulnerability management, 20. Unmasking the underworld: The secrets of the dark web