|Listed in category:
Have one to sell?

Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense by Ericss

Condition:
Brand New
3 available
Price:
US $77.48
ApproximatelyS$ 104.54
Postage:
Free Economy Shipping. See detailsfor shipping
Located in: Fairfield, Ohio, United States
Delivery:
Estimated between Wed, 12 Jun and Mon, 24 Jun to 43230
Estimated delivery dates - opens in a new window or tab include seller's handling time, origin ZIP Code, destination ZIP Code and time of acceptance and will depend on shipping service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return shipping. See details- for more information about returns
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)

Shop with confidence

eBay Premium Service
Trusted seller, fast shipping, and easy returns. 

Seller information

Registered as a Business Seller
Seller assumes all responsibility for this listing.
eBay item number:364816752759
Last updated on May 10, 2024 02:03:22 SGTView all revisionsView all revisions

Item specifics

Condition
Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
ISBN-13
9781108491594
Book Title
Exploring Malicious Hacker Communities
ISBN
9781108491594
Subject Area
Computers, Social Science
Publication Name
Exploring Malicious Hacker Communities : Toward Proactive Cyber Defence
Item Length
9.3 in
Publisher
Cambridge University Press
Subject
Sociology / General, Security / General
Publication Year
2021
Type
Textbook
Format
Hardcover
Language
English
Item Height
0.7 in
Author
Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Ericsson Marin, Eric Nunes
Item Width
6.1 in
Item Weight
15.5 Oz
Number of Pages
200 Pages

About this product

Product Information

Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits. The book covers both methodology - a hybridization of machine learning, artificial intelligence, and social network analysis methods - and the resulting conclusions, detailing how a deep understanding of malicious hacker communities can be the key to designing better attack prediction systems.

Product Identifiers

Publisher
Cambridge University Press
ISBN-10
1108491596
ISBN-13
9781108491594
eBay Product ID (ePID)
2321134602

Product Key Features

Author
Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Ericsson Marin, Eric Nunes
Publication Name
Exploring Malicious Hacker Communities : Toward Proactive Cyber Defence
Format
Hardcover
Language
English
Subject
Sociology / General, Security / General
Publication Year
2021
Type
Textbook
Subject Area
Computers, Social Science
Number of Pages
200 Pages

Dimensions

Item Length
9.3 in
Item Height
0.7 in
Item Width
6.1 in
Item Weight
15.5 Oz

Additional Product Features

LCCN
2020-051654
Intended Audience
Scholarly & Professional
Lc Classification Number
Hv6773.M3718 2021
Table of Content
Foreword Edward G. Amoroso; Preface; 1. Introduction; 2. Background; Part I. Understanding the Behavior of Malicious Hackers: 3. Mining key-hackers; 4. Reasoning about hacker engagement; 5. Uncovering communities of malware and exploit vendors; Part II. Predicting Imminent Cyber Threats: 6. Identifying exploits in the wild proactively; 7. Predicting enterprise-targeted external cyber-attacks; 8. Bringing social network analysis to aid in cyber-attack prediction; 9. Finding at-risk systems without software vulnerability identifiers (CVE's); 10. Final considerations.
Dewey Decimal
363.325
Dewey Edition
23
Illustrated
Yes

Item description from the seller

grandeagleretail

grandeagleretail

98.3% positive feedback
2.7M items sold
Usually responds within 24 hours

Detailed Seller Ratings

Average for the last 12 months

Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
4.9
Communication
4.9

Seller feedback (1,024,481)

t***6 (3)- Feedback left by buyer.
Past month
Verified purchase
Got book! Thanks!
v***r (128)- Feedback left by buyer.
Past month
Verified purchase
Brand new, just as described!
m***s (2411)- Feedback left by buyer.
Past month
Verified purchase
Reliable