• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Cyber Malware » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Cyber Malware

ISBN-13: 9783031349683 / Angielski / Twarda / 2023

Cyber Malware  9783031349683 Springer International Publishing - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Cyber Malware

ISBN-13: 9783031349683 / Angielski / Twarda / 2023

cena 442,79
(netto: 421,70 VAT:  5%)

Najniższa cena z 30 dni: 385,52
Termin realizacji zamówienia:
ok. 22 dni roboczych.

Darmowa dostawa!

This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.

Kategorie:
Technologie
Kategorie BISAC:
Technology & Engineering > Telecommunications
Social Science > Criminology
Computers > Security - General
Wydawca:
Springer International Publishing
Seria wydawnicza:
Security Informatics and Law Enforcement
Język:
Angielski
ISBN-13:
9783031349683
Rok wydania:
2023
Waga:
0.58 kg
Wymiary:
21.0 x 14.8
Oprawa:
Twarda

Part 1. Android Malware Analysis. Chapter 1. A Deep Vision-based Multi-Class Classification System of Android Malware Apps. Chapter. 2 Android Malware detection based on network analysis and federated learning. Chapter 3. ASParseV3: Auto Static Parser & Customizable Visualizer. Part 2. Network Malware Analysis. Chapter 4. Fast Flux Service Networks: Architecture, Characteristics and Detection Mechanisms. Chapter 5. Efficient Graph-based Malware Detection using Minimized Kernel and SVM. Chapter. 6 Deep Learning for Windows Malware Analysis. Part 3. IoT Malware Analysis. Chapter 7. Malware analysis for IoT and Smart AI-based Applications. Chapter 8. A Multi-Class Classification Approach for IoT Intrusion Detection Based on Feature Selection and Oversampling. Chapter 9. Malware Mitigation in Cloud Computing Architecture.

Dr. Iman Almomani received the bachelor’s degree from United Arab Emirates, in 2000, the master’s degree in computer science from Jordan, in 2002, and the Ph.D. degree in wireless network security from De Montfort University, U.K., in 2007. She is currently an Associate Professor in cybersecurity. She is also the Associate Director of the Research and Initiatives Centre (RIC) & the Innovation Center (IC) and also the Leader of the Security Engineering Laboratory (SEL) at Prince Sultan University (PSU), Riyadh, Saudi Arabia. Before Joining Prince Sultan University, she has worked as an Associate Professor and the Head of the Computer Science Department, The University of Jordan, Jordan. Her research interests include wireless networks and security, mainly wireless mobile ad hoc networks (WMANETs), wireless sensor networks (WSNs), multimedia networking (VoIP), and Internet of Things (IoT) security. She is also interested in in mobile operating systems security, including Android security. Iman has a wide experience in terms of applied research and product development in the area of cybersecurity maturity models and Assessment and Compliance Tools. She has several publications in the above areas in a number of reputable international and local journals and conferences. She is also a Senior Member of IEEE WIE. She is on the organizing and technical committees of a number of local and international conferences. She also serves as a reviewer and a member of the editorial board for a number of international journals.

Dr. Leandros A. Maglaras is a professor of cybersecurity in the School of Computing at Edinburgh Napier University. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from the Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004, and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield He is featured in Stanford University's list of the world’s Top 2% scientists. He is a Senior Member of the Institute of Electrical & Electronics Engineers (IEEE) and is an author of more than 200 papers in scientific magazines and conferences

Dr. Mohamed Amine Ferrag received the Bachelor’s, Master’s, Ph.D., and Habilitation degrees in computer science from Badji Mokhtar—Annaba University, Annaba, Algeria, in June, 2008, June, 2010, June, 2014, and April, 2019, respectively. From 2014 to 2022, he was an Associate Professor with the Department of Computer Science, Guelma University, Algeria. From 2019 to 2022, he was a Visiting Senior Researcher with the NAU-Lincoln Joint Research Center of Intelligent Engineering, Nanjing Agricultural University, China. Since 2022, he has been the Led Researcher with Artificial Intelligence & Digital Science Research Center, Technology Innovation Institute, Abu Dhabi, United Arab Emirates. His research interests include wireless network security, network coding security, applied cryptography, blockchain technology, and AI for cyber security. He has published over 100 papers in international journals and conferences in the above areas. He has been conducting several research projects with international collaborations on these topics. He was a recipient of the 2021 IEEE TEM Best Paper Award as well as the 2022 Scopus Algeria Award. He is featured in Stanford University’s list of the world’s Top 2% scientists for the years 2020, 2021, and 2022. He is a Senior Member of the Institute of Electrical & Electronic Engineers (IEEE) and a member of the Association for Computing Machinery (ACM).

 Dr. Nick Ayres received the Bachelor's degree (July, 1996) in Engineering Information Technology, Master's degree (June, 2013) in Cyber Security, Ph.D. degree (March, 2021) in Computer Science from De Montfort University, United Kingdom. He is a lecturer in Cyber Security specializing in incident response, social engineering and cyberterrorism. His current research interests include over the air automotive software updates and the impact of risk compensation. He has authored a number of publications concerning cyberterrorism as well as other topics including susceptibility to phishing utilizing fuzzy logic as well as several publications regarding automotive technology.


This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.

  • Presents theoretical, technical, and practical knowledge on defending against malware attacks;
  • Covers malware applications using machine learning algorithms, Blockchain and AI, forensics tools, and much more;
  • Includes perspectives from experts in cybersecurity at different institutions, including academia, research centers, and companies.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia