This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framew
238 113 2MB
English Pages 251 Year 2015
Report DMCA / Copyright
DOWNLOAD FILE
This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive s
536 141 6MB Read more
624 124 8MB Read more
506 138 21MB Read more
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber
1,447 62 6MB Read more
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporat
1,081 177 6MB Read more
The streets of Victorian London are clothed in shadows and secrets in Tessa Harris's gripping new mystery featuring
554 46 816KB Read more
923 176 22MB Read more
What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cy
236 48 3MB Read more
People believe what they want to believe. It is a striking-yet all too familiar-fact about human beings that our belief-
618 134 636KB Read more
Annotation This title is dedicated to understanding and fighting advanced persistent threats, today's most pernicio
186 13 4MB Read more