Darkweb Cyber Threat Intelligence Mining
暫譯: 暗網網路威脅情報挖掘
John Robertson, Ahmad Diab, Ericsson Marin, Eric Nunes, Vivin Paliath, Jana Shakarian, Paulo Shakarian
買這商品的人也買了...
-
$330C++黑客編程揭秘與防範(第2版) -
CISSP All-in-One Exam Guide, 7/e (Hardcover)$2,980$2,831 -
Open Source Intelligence Investigation: From Strategy to Implementation (Advanced Sciences and Technologies for Security Applications)$8,040$7,638 -
A History of Cyber Security Attacks: 1980 to Present$2,500$2,375 -
$534黑客大曝光:工業控制系統安全 (Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions) -
$474黑客大曝光 : 惡意軟件和 Rootkit 安全, 2/e -
Cyberspace and Cybersecurity, Second Edition$3,300$3,135 -
Functional Programming in C++: How to improve your C++ programs using functional techniques (Paperback)$1,840$1,748 -
特洛伊木馬病毒程式設計:使用 Python$520$406 -
$454黑客攻防大曝光:社會工程學、電腦黑客攻防、移動黑客攻防技術揭秘 -
$305黑客攻防從入門到精通 -
Python GUI 程式設計:PyQt5 實戰$690$538 -
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats$1,750$1,663 -
不會 C 也是資安高手:用 Python 和駭客大戰三百回合$620$490 -
5G 與車聯網 — 基於移動通信的車聯網技術與智能網聯汽車$336$319 -
$774AI 安全之對抗樣本入門 -
$3525G時代:什麼是5G,它將如何改變世界 -
最完整 5G 技術架構白皮書$780$546 -
The Modern Security Operations Center (Paperback)$2,200$2,156 -
駭客自首:極惡網路攻擊的內幕技巧$780$616 -
5G 來了!:生活變革、創業紅利、產業數位轉型,搶占全球2510億美元商機,人人皆可得利的未來,你準備好了嗎?$360$284 -
Kali Linux 滲透測試工具|花小錢做資安,你也是防駭高手, 3/e$880$748 -
Learn Enough JavaScript to Be Dangerous: A Tutorial Introduction to Programming with JavaScript$1,580$1,501 -
Learn Enough Python to Be Dangerous: Software Development, Flask Web Apps, and Beginning Data Science with Python (Paperback)$1,580$1,548 -
一本精通 - Python 範例應用大全:Python 詳細語法教學 & 100+ 個 Python 範例$880$695
相關主題
商品描述
The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.
商品描述(中文翻譯)
重要且迅速崛起的新領域稱為「網路威脅情報」(cyber threat intelligence),探討的範式是電腦網路的防禦者透過了解攻擊者擁有的資源來更好地理解其對手。在這本書中,一組專家從惡意駭客的黑暗網路(dark web)核心檢視一種新型的網路威脅情報。這些高度安全的網站使得匿名的惡意駭客社群能夠交流想法和技術,並買賣惡意軟體和漏洞利用工具。本書針對網路安全從業人員和研究人員,代表了邁向更好理解黑暗網路上惡意駭客社群及其應對措施的第一步。作者透過人類和自動化技術的結合,檢視真實的黑暗網路數據,以深入了解這些社群,並描述其方法論和結果。
