Related Books

Attribution of Advanced Persistent Threats
Language: en
Pages: 207
Authors: Timo Steffens
Categories: Computers
Type: BOOK - Published: 2020-07-20 - Publisher: Springer Nature

DOWNLOAD EBOOK

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of
Malware Data Science
Language: en
Pages: 274
Authors: Joshua Saxe
Categories: Computers
Type: BOOK - Published: 2018-09-25 - Publisher: No Starch Press

DOWNLOAD EBOOK

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "b
Cyber Security
Language: en
Pages: 177
Authors: Xiaochun Yun
Categories: Computer networks
Type: BOOK - Published: 2019-01-01 - Publisher: Springer

DOWNLOAD EBOOK

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, i
Cyber Denial, Deception and Counter Deception
Language: en
Pages: 251
Authors: Kristin E. Heckman
Categories: Computers
Type: BOOK - Published: 2015-11-13 - Publisher: Springer

DOWNLOAD EBOOK

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational,
Cyber Mercenaries
Language: en
Pages: 267
Authors: Tim Maurer
Categories: Law
Type: BOOK - Published: 2018-01-18 - Publisher: Cambridge University Press

DOWNLOAD EBOOK

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have be