語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Integrating artificial intelligence ...
~
IGI Global.
Integrating artificial intelligence in cybersecurity and forensic practices
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Integrating artificial intelligence in cybersecurity and forensic practicesMarwan Omar, Hewa Majeed Zangana, Derek Mohammed, editors.
其他作者:
Mohammed, Derek.
出版者:
Hershey, Pennsylvania :IGI Global,2025.
面頁冊數:
1 online resource (xviii, 484 p.) :ill.
標題:
Computer security.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-0588-2
ISBN:
9798337305905$q(ebook)
Integrating artificial intelligence in cybersecurity and forensic practices
Integrating artificial intelligence in cybersecurity and forensic practices
[electronic resource] /Marwan Omar, Hewa Majeed Zangana, Derek Mohammed, editors. - Hershey, Pennsylvania :IGI Global,2025. - 1 online resource (xviii, 484 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Introduction to Artificial Intelligence in Cybersecurity and Forensic Science -- Chapter 2. The Role of Machine Learning and Deep Learning in Threat Detection -- Chapter 3. Using Natural Language Processing (NLP) for Phishing and Spam Detection -- Chapter 4. Network Forensics and Traffic Analysis With Machine Learning -- Chapter 5. Image Denoising Techniques for Cybersecurity and Forensic Applications: AI-Driven Approaches -- Chapter 6. AutomatedEvidence Collection and Analysis Using AI -- Chapter 7. How Human-Centered Cybersecurity (HCC) Training Fosters Organizational Cybersecurity Cultures (CSC) -- Chapter 8. The Role of Cybersecurity Legislation in Promoting Data Privacy -- Chapter 9. Digital Forensic Data Mining and Pattern Recognition -- Chapter 10. Improving AppSec Resiliency, Monitoring, Risk Assessment, and Compliance by Bridging DevSecOps With SOCs -- Chapter 11. An In-Depth Investigation on Hardware Trojans Testing Into Cyber Security Concerns Using Machine Learning Models -- Chapter 12. Source Code Analysis With Deep Neural Networks -- Chapter 13. An In-Depth Analysis of a Cyber Attack: Case Study and Security Insights -- Chapter 14. UsingMachine Learning to Identify High-Risk Employee Activity in Proactive Insider Threat Detection -- Compilation of References -- About the Contributors -- Index.
Integrating Artificial Intelligence in Cybersecurity and Forensic Practices explores the evolving role of AI in cybersecurity and forensic science. It delves into key AI techniques, discussing their applications, benefits, and challenges in tackling modern cyber threats and forensic investigations. Covering topics such as automation, deep neural networks, and traffic analysis, this book is an excellent resource for professionals, researchers, students, IT security managers, threat analysts, digital forensic investigators, and more.
Mode of access: World Wide Web.
ISBN: 9798337305905$q(ebook)Subjects--Topical Terms:
184416
Computer security.
Subjects--Index Terms:
Artificial Intelligence (AI)Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25 / I58 2025eb
Dewey Class. No.: 005.8
Integrating artificial intelligence in cybersecurity and forensic practices
LDR
:03796nmm a2200553 a 4500
001
681654
006
m o d
007
cr nn |||muauu
008
251124s2025 paua ob 001 0 eng d
020
$a
9798337305905$q(ebook)
020
$z
9798337305882$q(hardback)
020
$z
9798337305899$q(paperback)
035
$a
(CaBNVSL)slc00007244
035
$a
(OCoLC)1479494548
035
$a
00360022
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2025eb
082
0 4
$a
005.8
$2
23
245
0 0
$a
Integrating artificial intelligence in cybersecurity and forensic practices
$h
[electronic resource] /
$c
Marwan Omar, Hewa Majeed Zangana, Derek Mohammed, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2025.
300
$a
1 online resource (xviii, 484 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Introduction to Artificial Intelligence in Cybersecurity and Forensic Science -- Chapter 2. The Role of Machine Learning and Deep Learning in Threat Detection -- Chapter 3. Using Natural Language Processing (NLP) for Phishing and Spam Detection -- Chapter 4. Network Forensics and Traffic Analysis With Machine Learning -- Chapter 5. Image Denoising Techniques for Cybersecurity and Forensic Applications: AI-Driven Approaches -- Chapter 6. AutomatedEvidence Collection and Analysis Using AI -- Chapter 7. How Human-Centered Cybersecurity (HCC) Training Fosters Organizational Cybersecurity Cultures (CSC) -- Chapter 8. The Role of Cybersecurity Legislation in Promoting Data Privacy -- Chapter 9. Digital Forensic Data Mining and Pattern Recognition -- Chapter 10. Improving AppSec Resiliency, Monitoring, Risk Assessment, and Compliance by Bridging DevSecOps With SOCs -- Chapter 11. An In-Depth Investigation on Hardware Trojans Testing Into Cyber Security Concerns Using Machine Learning Models -- Chapter 12. Source Code Analysis With Deep Neural Networks -- Chapter 13. An In-Depth Analysis of a Cyber Attack: Case Study and Security Insights -- Chapter 14. UsingMachine Learning to Identify High-Risk Employee Activity in Proactive Insider Threat Detection -- Compilation of References -- About the Contributors -- Index.
520
3
$a
Integrating Artificial Intelligence in Cybersecurity and Forensic Practices explores the evolving role of AI in cybersecurity and forensic science. It delves into key AI techniques, discussing their applications, benefits, and challenges in tackling modern cyber threats and forensic investigations. Covering topics such as automation, deep neural networks, and traffic analysis, this book is an excellent resource for professionals, researchers, students, IT security managers, threat analysts, digital forensic investigators, and more.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer security.
$3
184416
650
0
$a
Forensic sciences.
$3
230960
650
0
$a
Artificial intelligence.
$3
194058
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Criminal investigation
$x
Technological innovations.
$3
792830
653
$a
Artificial Intelligence (AI)
653
$a
Automation.
653
$a
Cyber Attacks.
653
$a
Cybersecurity.
653
$a
Data Mining.
653
$a
Data Privacy.
653
$a
Deep Learning.
653
$a
Deep Neural Networks.
653
$a
Forensics.
653
$a
Hardware Trojans.
653
$a
Human-Centered Cybersecurity (HCC)
653
$a
Image Denoising.
653
$a
Machine Learning (ML)
653
$a
Natural Language Processing (NLP)
653
$a
Network Forensics.
653
$a
Organizational Cybersecurity Cultures (CSC)
653
$a
Pattern Recognition.
653
$a
Phishing.
653
$a
Risk Assessment.
653
$a
Threat Detection.
653
$a
Traffic Analysis.
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Mohammed, Derek.
$3
995255
700
1
$a
Zangana, Hewa Majeed,
$d
1987-
$3
995256
700
1
$a
Omar, Marwan,
$d
1982-
$e
editor.
$3
777846
710
2
$a
IGI Global.
$3
529832
776
0 8
$i
Print version:
$z
9798337305882
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
795907
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-0588-2
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000254743
電子館藏
1圖書
電子書
EB QA76.9.A25 I58 2025eb 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-0588-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入