logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Spies in the Bits and Bytes : The Art of Cyber Threat Intelligence

Spies in the Bits and Bytes : The Art of Cyber Threat Intelligence (Hardcover)

Ali, Atif, Baber Majid Bhatti (지은이)
CRC Press
269,500원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
220,990원 -18% 0원
11,050원
209,940원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Spies in the Bits and Bytes : The Art of Cyber Threat Intelligence
eBook 미리보기

책 정보

· 제목 : Spies in the Bits and Bytes : The Art of Cyber Threat Intelligence (Hardcover) 
· 분류 : 외국도서 > 인문/사회 > 사회과학 > 범죄학
· ISBN : 9781032821092
· 쪽수 : 286쪽
· 출판일 : 2024-10-24

목차

1. Unveiling the Dark: Exploring Cyber Threats: An introductory exploration into the varied and evolving nature of cyber threats. 2. Cybercrime Unmasked: A Deep Dive into the Criminal Mind: Insight into the psychology and tactics of cybercriminals. 3. Masters of Defense: Harnessing AI and Machine Learning for Cybersecurity: Discussing the use of AI and machine learning in fortifying cyber defenses. 4. Blockchain Revolution: Fortifying the Digital Frontier: Examining the impact of blockchain technology on enhancing digital security. 5. Digital Detectives: The Art of Incident Investigation: Techniques and strategies used in cyber incident investigations. 6. Guardians of Your Data: Demystifying Antivirus Solutions: Understanding the workings and importance of antivirus software. 7. Decoding Digital Malice: The World of Malware Analysis: A detailed look at malware types, analysis, and defense strategies. 8. The Cyber Attack Odyssey: Navigating the Attack Life: An overview of the lifecycle of a cyber attack from inception to resolution. 9. Breaching the Wall: Uncovering System Compromising: Investigating methods used to compromise and breach systems. 10. Spycraft in the Digital Age: Intelligence and Info Gathering: The techniques of gathering information and intelligence in the cyber world. 11. Cyber Hunt or Be Hunted: The Art of Credential Hunting: Exploring the tactics of hunting for and protecting credentials. 12. The Climb to Control: Escalation of Privileges Unveiled: Understanding the methods of gaining elevated access in systems. 13. Eyes in the Shadows: The Power of Cyber Intelligence: The role of intelligence in understanding and combating cyber threats. 14. OSINT: Open Source Intelligence: The use and importance of publicly available information in cybersecurity. 15. Swift Response, Solid Defense: The Computer Incident Response Process: Outlining effective incident response strategies. 16. Strategies of the Cyber Knights: Crafting Countermeasures: Developing and implementing countermeasures against cyber threats. 17. Rising from the Ashes: The Cyber Recovery Process: The processes involved in recovering from a cyber incident. 18. The Guardian's Code: Crafting a Secure Security Policy: Guidelines for developing robust and effective security policies. 19. Hunting Vulnerabilities: The Art of Vulnerability Management: Techniques for identifying and managing system vulnerabilities.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책