Gespeichert in:
Beteilige Person: | |
---|---|
Format: | E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cambridge
Cambridge University Press
2017
|
Links: | https://doi.org/10.1017/9781316888513 |
Zusammenfassung: | The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results. |
Umfang: | 1 Online-Ressource (ix, 137 Seiten) |
ISBN: | 9781316888513 |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-20-CTM-CR9781316888513 | ||
003 | UkCbUP | ||
005 | 20170428095234.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr|||||||||||| | ||
008 | 160624s2017||||enk o ||1 0|eng|d | ||
020 | |a 9781316888513 | ||
100 | 1 | |a Robertson, John | |
245 | 1 | 0 | |a Darkweb cyber threat intelligence mining |c John Robertson, Arizona State University, [and six others] |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2017 | |
300 | |a 1 Online-Ressource (ix, 137 Seiten) | ||
336 | |b txt | ||
337 | |b c | ||
338 | |b cr | ||
520 | |a The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results. | ||
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781107185777 |
966 | 4 | 0 | |l DE-91 |p ZDB-20-CTM |q TUM_PDA_CTM |u https://doi.org/10.1017/9781316888513 |3 Volltext |
912 | |a ZDB-20-CTM | ||
912 | |a ZDB-20-CTM | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-20-CTM-CR9781316888513 |
---|---|
_version_ | 1832177784747720704 |
adam_text | |
any_adam_object | |
author | Robertson, John |
author_facet | Robertson, John |
author_role | |
author_sort | Robertson, John |
author_variant | j r jr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-20-CTM |
format | eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01658nam a2200241 i 4500</leader><controlfield tag="001">ZDB-20-CTM-CR9781316888513</controlfield><controlfield tag="003">UkCbUP</controlfield><controlfield tag="005">20170428095234.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr||||||||||||</controlfield><controlfield tag="008">160624s2017||||enk o ||1 0|eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781316888513</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Robertson, John</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Darkweb cyber threat intelligence mining</subfield><subfield code="c">John Robertson, Arizona State University, [and six others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (ix, 137 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781107185777</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-20-CTM</subfield><subfield code="q">TUM_PDA_CTM</subfield><subfield code="u">https://doi.org/10.1017/9781316888513</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CTM</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CTM</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-20-CTM-CR9781316888513 |
illustrated | Not Illustrated |
indexdate | 2025-05-15T09:21:36Z |
institution | BVB |
isbn | 9781316888513 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (ix, 137 Seiten) |
psigel | ZDB-20-CTM TUM_PDA_CTM ZDB-20-CTM |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Robertson, John Darkweb cyber threat intelligence mining John Robertson, Arizona State University, [and six others] Cambridge Cambridge University Press 2017 1 Online-Ressource (ix, 137 Seiten) txt c cr The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results. Erscheint auch als Druck-Ausgabe 9781107185777 |
spellingShingle | Robertson, John Darkweb cyber threat intelligence mining |
title | Darkweb cyber threat intelligence mining |
title_auth | Darkweb cyber threat intelligence mining |
title_exact_search | Darkweb cyber threat intelligence mining |
title_full | Darkweb cyber threat intelligence mining John Robertson, Arizona State University, [and six others] |
title_fullStr | Darkweb cyber threat intelligence mining John Robertson, Arizona State University, [and six others] |
title_full_unstemmed | Darkweb cyber threat intelligence mining John Robertson, Arizona State University, [and six others] |
title_short | Darkweb cyber threat intelligence mining |
title_sort | darkweb cyber threat intelligence mining |
work_keys_str_mv | AT robertsonjohn darkwebcyberthreatintelligencemining |