The art of cyber defense : from risk assessment to threat intelligence / edited by Youssef Baddi, Chouaib Doukkali University, El Jadida, Morocco [and three others].
2025
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Items
Details
Title
The art of cyber defense : from risk assessment to threat intelligence / edited by Youssef Baddi, Chouaib Doukkali University, El Jadida, Morocco [and three others].
Added Author
Edition
First edition.
Imprint
Boca Raton : CRC Press, 2025.
Description
1 online resource
Formatted Contents Note
Foundations of Cyber Defense and Risk Assessment
AI-Powered Strategies for Advanced Malware Detection and Prevention / by Syed Immamul Ansarullah, Abdul Wahid Wali, Irshad Rasheed, Peer Zada Rayees
Advancing Malware Classification with Hybrid Deep Learning / by Chougdali Khalid, Rabii El Hakouni
A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things / by Hicham YZZOGH, Hiba KANDIL and Hafssa BENABOUD
A Deep Dive into IoT Security
Machine Learning Solutions and Research Perspectives / by Ahmad Anwar Zainuddin, Muhammad Ziyad Fathullah Mohd Yazid, Nur Alya Aqilah Razak Ratne, Nur Fatnin Izzati Sidik, Nur Adila Ahmad Faizul, Aliah Maisarah Roslee, Nuramiratul Aisyah Ruzaidi
Exploring Blockchain Techniques for Enhancing IoT Security and Privacy
A Comprehensive Analysis / by Ahmad Anwar Zainuddin, Muhammad Aizzul Izzuddin Zulhazizi, Muhammad Firdaus Darmawan, Shahmie Abd Jalil, Muhammad Hafizudin Jamhari, Muhammad Syafiq
Analyzing and Responding to Emerging Threats
Integrating Security Analysis Module for Proactive Threat Intelligence / by Yassine Maleh and Abdelekbir Sahid
Security Study of Web Applications through a White Box Audit Approach
A Case Study / by Afef Jmal Maâlej and Mohamed Salem Eleze
Case Study Method
A Step-by-Step Black Box Audit for Security Study of Web Applications / by Afef Jmal Maâlej and Mohamed Salem Eleze
Security in Cloud-Based IoT
A Survey / by Abdelhalim Hnini, Anas Anouar, Ayoub Khadrani, Chaima Dhiba and Salmaa Naffah, Imane Chlioui
Exploring IoT penetration testing
From fundamentals to practical setup / by Yassine Maleh and Youssef Baddi
A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol / by Fatima LAKRAMI, Ouidad LABOUIDYA, Najib EL KAMOUN, Hind SOUNNI, Hicham TOUMI, Youssef BADDI, Zakariaa JAMAL
Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning / by Anas Harchi, Hicham Toumi, Mohamed Talea
An adaptive cybersecurity strategy based on game theory to manage emerging threats in the SDN infrastructure / by Jihad KILANI, Youssef BADDI, Faycal BENSALAH and Yousra FADILI
Human-Centric Risk Mitigation Approaches
A Human-Centric Approach to Cyber Risk Mitigation / by Ediomo Udofia
Human Factors in Cyber Defense / by Qasem Abu Al-Haija Qasem Abu Al-Haija
Security Operation Center
Towards A Maturity Model / by Achraf Samir Chamkar, Yassine MALEH and Noreddine Gherabi.
AI-Powered Strategies for Advanced Malware Detection and Prevention / by Syed Immamul Ansarullah, Abdul Wahid Wali, Irshad Rasheed, Peer Zada Rayees
Advancing Malware Classification with Hybrid Deep Learning / by Chougdali Khalid, Rabii El Hakouni
A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things / by Hicham YZZOGH, Hiba KANDIL and Hafssa BENABOUD
A Deep Dive into IoT Security
Machine Learning Solutions and Research Perspectives / by Ahmad Anwar Zainuddin, Muhammad Ziyad Fathullah Mohd Yazid, Nur Alya Aqilah Razak Ratne, Nur Fatnin Izzati Sidik, Nur Adila Ahmad Faizul, Aliah Maisarah Roslee, Nuramiratul Aisyah Ruzaidi
Exploring Blockchain Techniques for Enhancing IoT Security and Privacy
A Comprehensive Analysis / by Ahmad Anwar Zainuddin, Muhammad Aizzul Izzuddin Zulhazizi, Muhammad Firdaus Darmawan, Shahmie Abd Jalil, Muhammad Hafizudin Jamhari, Muhammad Syafiq
Analyzing and Responding to Emerging Threats
Integrating Security Analysis Module for Proactive Threat Intelligence / by Yassine Maleh and Abdelekbir Sahid
Security Study of Web Applications through a White Box Audit Approach
A Case Study / by Afef Jmal Maâlej and Mohamed Salem Eleze
Case Study Method
A Step-by-Step Black Box Audit for Security Study of Web Applications / by Afef Jmal Maâlej and Mohamed Salem Eleze
Security in Cloud-Based IoT
A Survey / by Abdelhalim Hnini, Anas Anouar, Ayoub Khadrani, Chaima Dhiba and Salmaa Naffah, Imane Chlioui
Exploring IoT penetration testing
From fundamentals to practical setup / by Yassine Maleh and Youssef Baddi
A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol / by Fatima LAKRAMI, Ouidad LABOUIDYA, Najib EL KAMOUN, Hind SOUNNI, Hicham TOUMI, Youssef BADDI, Zakariaa JAMAL
Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning / by Anas Harchi, Hicham Toumi, Mohamed Talea
An adaptive cybersecurity strategy based on game theory to manage emerging threats in the SDN infrastructure / by Jihad KILANI, Youssef BADDI, Faycal BENSALAH and Yousra FADILI
Human-Centric Risk Mitigation Approaches
A Human-Centric Approach to Cyber Risk Mitigation / by Ediomo Udofia
Human Factors in Cyber Defense / by Qasem Abu Al-Haija Qasem Abu Al-Haija
Security Operation Center
Towards A Maturity Model / by Achraf Samir Chamkar, Yassine MALEH and Noreddine Gherabi.
Summary
"The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures. Delving into the nuances of modern cyber threats, the book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber-attacks"-- Provided by publisher.
Source of Description
OCLC-licensed vendor bibliographic record.
Location
www
Linked Resources
Alternate Title
Taylor & Francis Online
Language
English
ISBN
9781032714806 (ebk)
1032714808
9781040124130 (electronic bk. : PDF)
1040124135 (electronic bk. : PDF)
9781040124222 (electronic bk. : EPUB)
1040124224 (electronic bk. : EPUB)
9781032714783 (hbk)
9781032714790 (pbk)
1032714808
9781040124130 (electronic bk. : PDF)
1040124135 (electronic bk. : PDF)
9781040124222 (electronic bk. : EPUB)
1040124224 (electronic bk. : EPUB)
9781032714783 (hbk)
9781032714790 (pbk)
Record Appears in