Guide to Vulnerability Analysis for Computer Networks and Systems

An Artificial Intelligence Approach

Nonfiction, Computers, Networking & Communications, Hardware, Computer Security, General Computing
Cover of the book Guide to Vulnerability Analysis for Computer Networks and Systems by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319926247
Publisher: Springer International Publishing Publication: September 4, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783319926247
Publisher: Springer International Publishing
Publication: September 4, 2018
Imprint: Springer
Language: English

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms.

Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process.

In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms.

Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process.

In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

More books from Springer International Publishing

Cover of the book Handbook of Early Childhood Special Education by
Cover of the book The Southern African Development Community (SADC) and the European Union (EU) by
Cover of the book Computational and Corpus-Based Phraseology by
Cover of the book Management and Governance of Networks by
Cover of the book Clinician’s Guide to Adult ADHD Comorbidities by
Cover of the book Exploring the Design and Effects of Internal Knowledge Markets by
Cover of the book The Restoration of the Jews: Early Modern Hermeneutics, Eschatology, and National Identity in the Works of Thomas Brightman by
Cover of the book Human Dignity of the Vulnerable in the Age of Rights by
Cover of the book Building Sustainable Health Ecosystems by
Cover of the book Preventing Health and Environmental Risks in Latin America by
Cover of the book A History of Abstract Algebra by
Cover of the book Esther in Early Modern Iberia and the Sephardic Diaspora by
Cover of the book China’s Diplomacy and Economic Activities in Africa by
Cover of the book Engineering Identities, Epistemologies and Values by
Cover of the book Mechatronics and Machine Vision in Practice 3 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy