Listing 1 - 10 of 27 << page
of 3
>>
Sort by

Book
Information security across federal agencies : analysis of adequacy and effectiveness
Author:
ISBN: 1634849531 9781634849531 1634849485 9781634849487 Year: 2016 Publisher: New York, [New York] : Novinka,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cyberwarfare
Author:
ISBN: 1523132779 1630815780 9781630815783 9781630815769 Year: 2020 Publisher: Norwood, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.--


Book
Proceedings of the 10th annual Cyber and Information Security Research Conference
Authors: ---
ISBN: 1450333451 Year: 2015 Publisher: New York : ACM,


Book
Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint
Author:
ISBN: 1479963631 1479963658 147996364X Year: 2014 Publisher: Piscataway, New Jersey : Institute of Electrical and Electronics Engineers (IEEE),


Book
Proceedings of the 11th annual Cyber and Information Security Research Conference
Authors: --- ---
ISBN: 145033752X Year: 2016 Publisher: New York : ACM,


Book
Darkweb cyber threat intelligence mining
Author:
ISBN: 1316952878 1316888517 1316946649 1107185777 Year: 2017 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.


Book
Understand, Manage, and Measure Cyber Risk
Authors: ---
ISBN: 9781484278215 Year: 2022 Publisher: Berkeley, CA Apress :Imprint: Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are available-many with sound advice, management approaches, and technical solutions-but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy foundational cyber risk management approach applicable to your entire organization. The book provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and helps practitioners pull cyber from a "technical" problem to a "business risk management" problem, equipping you with a simple approach to understand, manage, and measure cyber risk for your enterprise. What You Will Learn Educate the executives/board on what you are doing to reduce risk Communicate the value of cybersecurity programs and investments through insightful risk-informative metrics Know your key performance indicators (KPIs), key risk indicators (KRIs), and/or objectives and key results Prioritize appropriate resources through identifying program-related gaps Lay down the foundational components of a program based on real examples, including pitfalls to avoid Who This Book Is For CISOs, CROs, CIOs, directors of risk management, and anyone struggling to pull together frameworks or basic metrics to quantify uncertainty and address risk.


Book
Tenth international conference on applications and techniques in cyber intelligence (ICATCI 2022).
Author:
ISBN: 3031288939 3031288920 Year: 2023 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.


Book
Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022).
Author:
ISBN: 3031290976 3031290968 Year: 2023 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.


Book
Cybersecurity and applied mathematics
Authors: ---
ISBN: 0128044993 0128044527 9780128044995 9780128044520 Year: 2016 Publisher: Cambridge, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data. Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand Contains numerous cybersecurity examples and exercises using real world data Written by mathematicians and statisticians with hands-on practitioner experience

Listing 1 - 10 of 27 << page
of 3
>>
Sort by