|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
11036544 |
003 |
ICU |
005 |
20170512161523.6 |
008 |
161202s2017 enka b 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|c YDX
|d THM
|d NhCcYBP
|
020 |
|
|
|a 1107185777
|q (hardback)
|
020 |
|
|
|a 9781107185777
|q (hardback)
|
035 |
|
|
|a (OCoLC)964928813
|
050 |
|
4 |
|a QA76.9.A25
|b R634 2017
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Robertson, John,
|e author.
|0 http://id.loc.gov/authorities/names/n82034677
|1 http://viaf.org/viaf/37075110
|
245 |
1 |
0 |
|a Darkweb cyber threat intelligence mining /
|c John Robertson, [and six others].
|
264 |
|
1 |
|a Cambridge, United Kingdom ;
|a New York, NY, USA :
|b Cambridge University Press,
|c 2017.
|
300 |
|
|
|a ix, 137 pages :
|b illustrations ;
|c 24 cm
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
504 |
|
|
|a Includes bibliographical references (pages 127-134) and index.
|
505 |
0 |
|
|a Moving to proactive cyber threat intelligence -- Understanding darkweb malicious hacker forums -- Automatic mining of cyber intelligence from the darkweb -- Analyzing products and vendors in malicious hacking markets -- Using game theory for threat intelligence -- Application : protecting industrial control systems.
|
520 |
8 |
|
|a "In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the darkweb. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas, techniques and buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the darkweb and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results."--Cover, page 4
|
650 |
|
0 |
|a World Wide Web
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh2010118447
|
650 |
|
0 |
|a Cyber intelligence (Computer security)
|0 http://id.loc.gov/authorities/subjects/sh2011005959
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|0 http://id.loc.gov/authorities/subjects/sh85029493
|
650 |
|
0 |
|a Data mining.
|0 http://id.loc.gov/authorities/subjects/sh97002073
|
650 |
|
7 |
|a Computer crimes
|x Investigation.
|2 fast
|0 http://id.worldcat.org/fast/fst00872065
|
650 |
|
7 |
|a Cyber intelligence (Computer security)
|2 fast
|0 http://id.worldcat.org/fast/fst01893401
|
650 |
|
7 |
|a Data mining.
|2 fast
|0 http://id.worldcat.org/fast/fst00887946
|
903 |
|
|
|a HeVa
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i 45f9cdea-4b8b-5884-b79f-48754d084607
|s bd0f7773-0761-5b88-801b-faa6ac039f3a
|
928 |
|
|
|t Library of Congress classification
|a QA76.9.A25R634 2017
|l JCL
|c JCL-Sci
|i 9529381
|
927 |
|
|
|t Library of Congress classification
|a QA76.9.A25R634 2017
|l JCL
|c JCL-Sci
|e RECA
|e CRERAR
|b 113696659
|i 9777134
|