Exploring malicious hacker communities: toward proactive cyber-defence
Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack predictio...
Authors: | ; ; ; ; ; |
---|---|
Contributors: | |
Format: | Electronic/Print Book |
Language: | English |
Published: |
Cambridge, United Kingdom New York, NY, USA Port Melbourne, VIC, Australia New Delhi, India Singapore
Cambridge University Press
2021
|
In: | Year: 2021 |
Online Access: |
Table of Contents Blurb Volltext (doi) |
Availability in Tübingen: | Present in Tübingen. UB: KB 21 A 1282 |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: | |
Related Items: | Erscheint auch als:
1757952500 |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1744461880 | ||
003 | DE-627 | ||
005 | 20230610173226.0 | ||
007 | tu | ||
008 | 210112s2021 xxk||||| 00| ||eng c | ||
010 | |a 2020051654 | ||
020 | |a 9781108491594 |c Festeinband |9 978-1-108-49159-4 | ||
020 | |z 9781108869003 | ||
024 | 7 | |a 10.1017/9781108869003 |2 doi | |
035 | |a (DE-627)1744461880 | ||
035 | |a (DE-599)KXP1744461880 | ||
035 | |a (OCoLC)1261744917 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-GB |c XD-US |c XE-AU |c XB-IN |c XB-SG | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 363.325 |q LOC | |
084 | |a 2,1 |2 ssgn | ||
084 | |a ST 277 |q DE-16-160 |2 rvk |0 (DE-625)rvk/143643: | ||
100 | 1 | |a Marin, Ericsson |e VerfasserIn |0 (DE-588)1167978943 |0 (DE-627)1031674144 |0 (DE-576)511382804 |4 aut | |
109 | |a Marin, Ericsson | ||
245 | 1 | 0 | |a Exploring malicious hacker communities |b toward proactive cyber-defence |c Ericsson Marin (California State Polytechnic University, Pomona), Mohammed Almukaynizi (King Saud University), Soumajyoti Sarkar (Arizona State University), Eric Nunes (Arizona State University), Jana Shakarian (Cyber Reconnaissance, Inc.), Paulo Shakarian (Arizona State University and Cyber Reconnaissance, Inc.) ; foreword by Edward G. Amoroso (TAG Cyber) |
264 | 1 | |a Cambridge, United Kingdom |a New York, NY, USA |a Port Melbourne, VIC, Australia |a New Delhi, India |a Singapore |b Cambridge University Press |c 2021 | |
300 | |a xii, 211 Seiten |b Illustrationen, Diagramme | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations. | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f SSG |2 pdager |5 DE-21 | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Hackers |x Social networks | |
650 | 0 | |a Social Sciences |x Network analysis | |
650 | 0 | |a Data Mining | |
650 | 0 | |a Hacking |x Prevention | |
650 | 0 | |a Cyberterrorism |x Prevention | |
689 | 0 | 0 | |d s |0 (DE-588)4113821-1 |0 (DE-627)105826642 |0 (DE-576)209479604 |a Hacker |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4428654-5 |0 (DE-627)216935180 |0 (DE-576)212347217 |a Data Mining |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4076308-0 |0 (DE-627)104364106 |0 (DE-576)209201428 |a Prävention |2 gnd |
689 | 0 | 4 | |d s |0 (DE-588)4181167-7 |0 (DE-627)104353333 |0 (DE-576)210002980 |a Sicherheitsmaßnahme |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Almukaynizi, Mohammed |d 1987- |e VerfasserIn |0 (DE-588)1234083841 |0 (DE-627)1758948493 |4 aut | |
700 | 1 | |a Sarkar, Soumajyoti |d 1992- |e VerfasserIn |0 (DE-588)1234084449 |0 (DE-627)1758949759 |4 aut | |
700 | 1 | |a Nunes, Eric |e VerfasserIn |0 (DE-588)1167978951 |0 (DE-627)1031674152 |0 (DE-576)511382790 |4 aut | |
700 | 1 | |a Shakarian, Jana |d 1977- |e VerfasserIn |0 (DE-588)1234085062 |0 (DE-627)1758951133 |4 aut | |
700 | 1 | |a Shakarian, Paulo |d 1980- |e VerfasserIn |0 (DE-588)1234085496 |0 (DE-627)1758951982 |4 aut | |
700 | 1 | |a Amoroso, Edward G. |e VerfasserIn eines Vorworts |0 (DE-588)1089223838 |0 (DE-627)853032440 |0 (DE-576)45981527X |4 wpr | |
776 | 1 | |z 9781108869003 |c epub | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |a Marin, Ericsson |t Exploring malicious hacker communities |d Cambridge, United Kingdom : Cambridge University Press, 2021 |h 1 Online-Ressource (xii, 211 Seiten) |w (DE-627)1757952500 |z 9781108869003 |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1744461880inh.htm |m V:DE-576;B:DE-21 |q application/pdf |v 20210610182902 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1744461880kla.htm |m V:DE-576;B:DE-21 |q application/pdf |v 20210610182902 |3 Klappentext |
856 | |u https://doi.org/10.1017/9781108869003 |x doi |3 Volltext | ||
935 | |a mkri | ||
936 | r | v | |a ST 277 |b Sonstiges zur Sicherheit in der Datenverarbeitung |k Monografien |k Software und -entwicklung |k Sonstiges zur Sicherheit in der Datenverarbeitung |0 (DE-627)1271118971 |0 (DE-625)rvk/143643: |0 (DE-576)201118971 |
951 | |a BO | ||
ELC | |a 1 |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3872485733 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1744461880 | ||
LOK | |0 005 20210526114124 | ||
LOK | |0 008 210224||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 21 A 1282 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 938 |a 2105 |f 34 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3955205754 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1744461880 | ||
LOK | |0 005 20210903115407 | ||
LOK | |0 008 210719||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 21 A 1282 |