bszlogo
Deutsch Englisch Französisch Spanisch
SWB
sortiert nach
nur Zeitschriften/Serien/Datenbanken nur Online-Ressourcen OpenAccess
  Unscharfe Suche
Suchgeschichte Kurzliste Vollanzeige Besitznachweis(e)

Recherche beenden

  

Ergebnisanalyse

  

Speichern / Druckansicht

  

Druckvorschau

  
1 von 1
      
1 von 1
      
* Ihre Aktion:   suchen [und] (PICA Prod.-Nr. [PPN]) 1737416522
 Felder   ISBD   MARC21 (FL_924)   Citavi, Referencemanager (RIS)   Endnote Tagged Format   BibTex-Format   RDF-Format 
Bücher, Karten, Noten
 
K10plusPPN: 
1737416522     Zitierlink
Titel: 
Methods and data analysis for cross-cultural research / Fons J.R. van de Vijver (Tilburg University, the Netherlands; North-West University, South Africa; University of Queensland, Australia), Kwok Leung (Chinese University of Hong Kong) ; Editors: Velichko H. Fetvadjiev(University of Amsterdam), Jia He (Tilburg University), Johnny R.J. Fontaine,
Autorin/Autor: 
Vijver, Fons J. R. van de, 1952-2019 [Verfasserin/Verfasser] info info
Beteiligt: 
Leung, Kwok, 1958-2015 [Verfasserin/Verfasser] info info ; Fetvadjiev, Velichko H. [Herausgeberin/-geber] ; He, Jia [Herausgeberin/-geber] info info ; Fontaine, Johnny R. J. [Herausgeberin/-geber]
Ausgabe: 
Second edition
Erschienen: 
Cambride ; New York ; Melbourne ; New Delhi ; Singapore : Cambridge University Press, 2021
Umfang: 
xvii, 189 Seiten : Illustrationen, Diagramme
Sprache(n): 
Englisch
Schriftenreihe: 
Anmerkung: 
Includes bibliographical references and index
Bibliogr. Zusammenhang: 
ISBN: 
978-1-107-69467-5 (paperback); 978-1-107-05779-1 (hardback)
978-1-107-41518-8 (ISBN der parallelen Ausgabe im Fernzugriff)
LoC-Nr.: 
2020046846
Sonstige Nummern: 
OCoLC: 1260300089     see Worldcat


Sachgebiete: 
Sonstige Schlagwörter: 
Inhaltliche
Zusammenfassung: 
"Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication and behavior of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits. The book covers both methodology-a hybridization of machine learning, artificial intelligence, and social network analysis methods-and the resulting conclusions, detailing how a deep understanding of malicious hacker communities can be the key to designing better attack prediction systems"--
1 von 1
      
1 von 1