|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Ericsson Marin (California State Polytechnic University, Pomona) , Mohammed Almukaynizi (King Saud University, Saudi Arabia) , Soumajyoti Sarkar (Arizona State University) , Eric Nunes (Arizona State University)Publisher: Cambridge University Press Imprint: Cambridge University Press Dimensions: Width: 15.60cm , Height: 1.70cm , Length: 23.50cm Weight: 0.440kg ISBN: 9781108491594ISBN 10: 1108491596 Pages: 200 Publication Date: 29 April 2021 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsForeword Edward G. Amoroso; Preface; 1. Introduction; 2. Background; Part I. Understanding the Behavior of Malicious Hackers: 3. Mining key-hackers; 4. Reasoning about hacker engagement; 5. Uncovering communities of malware and exploit vendors; Part II. Predicting Imminent Cyber Threats: 6. Identifying exploits in the wild proactively; 7. Predicting enterprise-targeted external cyber-attacks; 8. Bringing social network analysis to aid in cyber-attack prediction; 9. Finding at-risk systems without software vulnerability identifiers (CVE's); 10. Final considerations.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |