Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Machine learning ; Artificial intelligence ; Computer networks ; Security measures ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: For security professionals seeking reliable ways to combat persistent threats to their networks, there's encouraging news. Tools that employ AI and machine learning have begun to replace the older rules- and signature-based tools that can no longer combat today's sophisticated attacks. In this ebook, Oracle's Laurent Gil and Recorded Future's Allan Liska look at the strengths (and limitations) of AI- and ML-based security tools for dealing with today's threat landscape. This high-level overview demonstrates how these new tools use AI and ML to quickly identify threats, connect attack patterns, and allow operators and analysts to focus on their core mission. You'll also learn how managed security service providers (MSSPs) use AI and ML to identify patterns from across their customer base. This ebook explains: Why rules-based, signature-based, and firewall solutions have fallen short How automated bots enable cybercriminals and nation-state actors to attack your network The evolution of the botnet: how threat actors constantly change their attack strategy How AI and ML techniques in web applications help you observe, quantify, and classify inbound requests How to detect insider threats and advanced persistent threat actors with AI and ML tools Case studies that show how a media company, an airline, and a university use AL and ML in security
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed March 19, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer security ; Computer crimes ; Electronic books ; Electronic books ; local
    Abstract: The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed November 29, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780128021453
    Language: English
    Pages: 1 online resource (200 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way. Provides a roadmap and direction on how to build an intelligence-led information security program to protect your company. Learn how to understand your network through logs and client monitoring, so you can effectively evaluate threat intelligence. Learn how to use popular tools such as BIND, SNORT, squid, STIX, TAXII, CyBox, and splunk to conduct network intelligence.
    Note: Online resource; Title from title page (viewed December 10, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: First edition.
    Keywords: Web applications ; Security measures ; Data protection ; Malware (Computer software) ; Electronic books ; Electronic books ; local
    Abstract: Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company's vulnerabilities to common web application security threats, such as malicious bots, application exploits, API attacks, DDoS attacks, and server-based malware. You'll learn proactive steps to implement services and strategies designed to protect online enterprise applications at the user edge. Authors Stephen Gates, edge security evangelist and SME at Oracle Dyn, and Allan Liska, threat intelligence architect at Recorded Future, explore how advanced DNS services, web application firewall (WAF) services, bot management, API security, DDoS defenses, and malware protection solutions combine to protect your sites and applications from malicious attacks and bad actors. Understand the current web application threats landscape Prioritize availability, confidentiality, and integrity and manage associated security risks Explore the role of DNS in maintaining availability Learn how to approach cloud-based web application security Plan your strategy with a web application security checklist
    Note: Description based on online resource; title from title page (Safari, viewed April 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Computer networks ; Security measures ; Computer crimes ; Investigation ; Business enterprises ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Many organizations are discovering that traditional security tools alone aren't enough to protect their networks. In this practical report, you'll explore threat intelligence, a method for collecting information on various forms of malicious cyber activity as a way to bolster your in-house measures. Author Allan Liska, security architect at Recorded Future, takes you through the threat intelligence cycle and explains what is required to put together an effective threat intelligence program for your company. Backed by case studies of several organizations that have successfully implemented these initiatives, this report explains that threat intelligence is actionable external information that, when correlated against internal data, can be used to detect or prevent an attack. You'll understand how threat intelligence enables you to stay abreast of current as well as future threats. Understand exactly what threat intelligence is, and how to correlate it to internal events Collect and apply threat intelligence, gain feedback, and incorporate feedback into your own threat intelligence cycle Examine tactical, operational, and strategic intelligence, and ensure that the right information gets to the right people Get practical examples from several organizations that have correctly implemented threat intelligence programs
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed January 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...