The Art of Cyber Defense From Risk Assessment to Threat Intelligence
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
Other Authors: | |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Boca Raton, FL :
CRC Press
[2025]
|
Edition: | First edition |
Series: | Advances in Cybersecurity Management Series
|
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009869112906719 |
Table of Contents:
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Preface
- Introduction
- About the Editor
- List of Contributors
- Part I: Foundations of cyber defense and risk assessment
- 1 AI-powered strategies for advanced malware detection and prevention
- 2 Advancing malware classification with hybrid deep learning: A comprehensive analysis using DenseNet and LSTM
- 3 A comprehensive overview of AI-driven behavioral analysis for security in Internet of Things
- 4 A deep dive into IoT security: Machine learning solutions and research perspectives
- 5 Exploring Blockchain techniques for enhancing IoT security and privacy: A comprehensive analysis
- Part II: Analyzing and responding to emerging threats
- 6 Integrating security analysis module for proactive threat intelligence
- 7 Security study of Web applications through a white-box audit approach: A case study
- 8 Case study method: A step-by-step black-box audit for security study of Web applications
- 9 Security in cloud-based IoT: A survey
- 10 Exploring IoT penetration testing: From fundamentals to practical setup
- 11 A fuzzy logic-based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol
- 12 Collaborative Cloud-SDN architecture for IoT privacy-preserving based on federated learning
- 13 An adaptive cybersecurity strategy based on game theory to manage emerging threats in the SDN infrastructure
- Part III: Human-centric risk mitigation approaches
- 14 A human-centric approach to cyber risk mitigation
- 15 Human factors in cyber defense
- 16 Security operation center: Toward a maturity model
- Index.