logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

The Art of Cyber Defense : From Risk Assessment to Threat Intelligence

The Art of Cyber Defense : From Risk Assessment to Threat Intelligence (Hardcover)

Mohammed Amin, Yassine Maleh, Youssef Baddi, Omar Almomani (엮은이)
CRC Press
269,500원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
220,990원 -18% 0원
11,050원
209,940원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

The Art of Cyber Defense : From Risk Assessment to Threat Intelligence
eBook 미리보기

책 정보

· 제목 : The Art of Cyber Defense : From Risk Assessment to Threat Intelligence (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9781032714783
· 쪽수 : 310쪽
· 출판일 : 2024-11-08

목차

Part I: Foundations of Cyber Defense and Risk Assessment

Chapter 1: AI-Powered Strategies for Advanced Malware Detection and Prevention

Chapter 2: Advancing Malware Classification with Hybrid Deep Learning,?by Chougdali Khalid, Rabii El Hakouni

Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things

Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and Research Perspectives

Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and Privacy: A Comprehensive Analysis

Part II: Analyzing and Responding to Emerging Threats

Chapter 6: Integrating Security Analysis Module for Proactive Threat Intelligence

Chapter 7: Security Study of Web Applications through a White Box Audit Approach: A Case Study

Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security Study of Web Applications

Chapter 9: Security in Cloud-Based IoT: A Survey

Chapter 10: Exploring IoT penetration testing: From fundamentals to practical setup

Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol

Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning

Chapter 13: An adaptive cybersecurity strategy based on game theory to manage emerging threats in the SDN infrastructure

Part III: Human-Centric Risk Mitigation Approaches

Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation

Chapter 15: Human Factors in Cyber Defense

Chapter 16: Security Operation Center: Towards A Maturity Model

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책