Security Analytics : a data centric approach to information security / edited by Mehak Khurana, Shilpa Mahajan.
Material type:
TextSeries: Chapman & Hall/CRC cyber-physical systemsPublication details: Boca Raton: CRC Press, 2022.Edition: First editionDescription: 223 pages; 26 cmISBN: - 9781032072418
- 005.8 23/eng/20220322
- QA76.9 .A25 K45 2022
| Item type | Current library | Collection | Call number | Copy number | Status | Notes | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Rabdan Academy General Stacks | General Collection | QA76.9 .A25 K45 2022 (Browse shelf(Opens below)) | C. 2 | Available | AED 492.45 | 22282 | |
Books
|
Zayed Military University General Stacks | General Collection | QA76.9 .A25 K45 2022 (Browse shelf(Opens below)) | C. 1 | Available | AED 515.00 | 21952 |
Browsing Zayed Military University shelves,Shelving location: General Stacks,Collection: General Collection Close shelf browser (Hides shelf browser)
|
|
No cover image available |
|
|
|
|
||
| QA76.73 .P98 S974 2020 Automate The Boring Stuff With Python : practical programming for total beginners / | QA76.76 .S73 L314 2022 Requirements Engineering for Software and Systems / | QA76.9 .A25 2021 Cyber Security Education : principles and policies / | QA76.9 .A25 K45 2022 Security Analytics : a data centric approach to information security / | QA76.9 .B45 O64 2017 Weapons of Math Destruction : how big data increases inequality and threatens democracy / | QA76.9 .B45 O64 2017 Weapons of Math Destruction : how big data increases inequality and threatens democracy / | QA76.9 .B56 K35 2022 الذكاء الاصطناعي والبلوك تشين : كيف ينبغي تنظيم التقنيات الناشئة؟ / |
Includes bibliographical references and index.
"The book gives useful insight on various machine learning techniques for cyber security analytics. Nowadays around 98% objects and devices are connected with the outside world through sensors and actuators. They are increasingly networked with one another and on the internet.This book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security. It also aids to plunge into a career in cybersecurity to even the unlearned. This book also expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. It also expounds on how to analyse in order to recover information after a cybercrime"--
There are no comments on this title.