img Leseprobe Leseprobe

Guide to Vulnerability Analysis for Computer Networks and Systems

An Artificial Intelligence Approach

Simon Parkinson (Hrsg.), Andrew Crampton (Hrsg.), Richard Hill (Hrsg.)

PDF
ca. 58,84
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Springer International Publishing img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Datenkommunikation, Netzwerke

Beschreibung

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms.

Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process.

In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

Weitere Titel in dieser Kategorie
Cover Desktop Witness
Michael A. Caloyannides
Cover Inferno Programming with Limbo
Phillip Stanley-Marbell
Cover LaTeX Cookbook
Stefan Kottwitz
Cover Smart Edge Computing
Prasenjit Chatterjee

Kundenbewertungen

Schlagwörter

Visualisation, Knowledge extraction, Data acquisition, Anomaly and causality detection, Identification of assets, Vulnerability assessment, Mitigation techniques