000 02076nam a22003258i 4500
001 CR9781316888513
003 UkCbUP
005 20200124160336.0
006 m|||||o||d||||||||
007 cr||||||||||||
008 160624s2017||||enk o ||1 0|eng|d
020 _a9781316888513 (ebook)
020 _z9781107185777 (hardback)
040 _aUkCbUP
_beng
_erda
_cUkCbUP
050 4 _aHV6773
_b.R63 2017
082 0 4 _a364.168
_223
100 1 _aRobertson, John,
_eauthor.
245 1 0 _aDarkweb cyber threat intelligence mining /
_cJohn Robertson, Arizona State University, [and six others].
264 1 _aCambridge :
_bCambridge University Press,
_c2017.
300 _a1 online resource (ix, 137 pages) :
_bdigital, PDF file(s).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aTitle from publisher's bibliographic system (viewed on 21 Apr 2017).
520 _aThe important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.
650 0 _aComputer crimes.
650 0 _aCyber intelligence (Computer security)
776 0 8 _iPrint version:
_z9781107185777
856 4 0 _uhttps://doi.org/10.1017/9781316888513
999 _c523012
_d523010