The Art of Cyber Defense From Risk Assessment to Threat Intelligence
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press
[2025]
|
Edición: | First edition |
Colección: | Advances in Cybersecurity Management Series
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009869112906719 |
Tabla de Contenidos:
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Preface
- Introduction
- About the Editor
- List of Contributors
- Part I: Foundations of cyber defense and risk assessment
- 1 AI-powered strategies for advanced malware detection and prevention
- 2 Advancing malware classification with hybrid deep learning: A comprehensive analysis using DenseNet and LSTM
- 3 A comprehensive overview of AI-driven behavioral analysis for security in Internet of Things
- 4 A deep dive into IoT security: Machine learning solutions and research perspectives
- 5 Exploring Blockchain techniques for enhancing IoT security and privacy: A comprehensive analysis
- Part II: Analyzing and responding to emerging threats
- 6 Integrating security analysis module for proactive threat intelligence
- 7 Security study of Web applications through a white-box audit approach: A case study
- 8 Case study method: A step-by-step black-box audit for security study of Web applications
- 9 Security in cloud-based IoT: A survey
- 10 Exploring IoT penetration testing: From fundamentals to practical setup
- 11 A fuzzy logic-based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol
- 12 Collaborative Cloud-SDN architecture for IoT privacy-preserving based on federated learning
- 13 An adaptive cybersecurity strategy based on game theory to manage emerging threats in the SDN infrastructure
- Part III: Human-centric risk mitigation approaches
- 14 A human-centric approach to cyber risk mitigation
- 15 Human factors in cyber defense
- 16 Security operation center: Toward a maturity model
- Index.