We got a MARS box at my work, so I grabbed this book to get up to snuff. It was a very annoying and frustrating book. The first 1/3 of the book seemed to be semi-marketing fluff, and actually prompted me to note "hahaha" in one of the margins. In about a decade of working through technical books,
Cyber-Security Threats, Actors, and Dynamic Mitigation
β Scribed by Nicholas Kolokotronis and Stavros Shiaeles
- Publisher
- CRC Press
- Year
- 2021
- Tongue
- English
- Leaves
- 392
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT.
With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits.
Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. γThose wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.
β¦ Table of Contents
Cover
Half Title
Title Page
Copyright Page
Dedication
Contents
Preface
Acknowledgments
Editors
Contributors
Chapter 1: Profiles of Cyber-Attackers and Attacks
Chapter 2: Reconnaissance
Chapter 3: System Threats
Chapter 4: Cryptography Threats
Chapter 5: Network Threats
Chapter 6: Malware Detection and Mitigation
Chapter 7: Dynamic Risk Management
Chapter 8: Attack Graph Generation
Chapter 9: Intelligent Intrusion Response
Index
π SIMILAR VOLUMES
Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System. While it is commonly understood that deploying network security devices is critical to the well-being of an organization's systems and data, all too often companies assume that simply ha
This important edition focuses on the human factor in training, cautionary tales of breaches that occurred through human error, while also identifying storytelling as an effective tool in cyber eduction. Topics include: Addressing management issues Approaches to cyber defence Innovative tools for th
1 online resource
Gain comprehensive insights to safeguard your systems against advanced threats and maintain resilient security posture Key Features Develop a comprehensive understanding of advanced defense strategies to shape robust security programs Evaluate the effectiveness of a security strategy through th