Nothing Special   »   [go: up one dir, main page]

Skip to main content

Guide to Vulnerability Analysis for Computer Networks and Systems

An Artificial Intelligence Approach

  • Book
  • © 2018

Overview

  • Highlights the strong requirement for expert knowledge, and how a lack of this is preventing businesses from performing their own vulnerability assessments
  • Approaches the challenges of IT vulnerability assessment from both technical and business perspectives, taking into consideration the latest IT trends
  • Helps the reader to improve their understanding of the challenges and issues covered, through case studies suitable for readers of different abilities (e.g., both students and practitioners)
  • Proposes solutions that utilise artificial intelligence to develop rich functionality whilst minimising the need for end-user expert knowledge

Part of the book series: Computer Communications and Networks (CCN)

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook USD 15.99 USD 44.99
Discount applied Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms.

Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process.

In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

Similar content being viewed by others

Keywords

Table of contents (16 chapters)

  1. Vulnerability Assessment Frameworks

  2. Applications of Artificial Intelligence

  3. Visualisation

Editors and Affiliations

  • Department of Computer Science, School of Computing and Engineering, University of Huddersfield, Huddersfield, UK

    Simon Parkinson, Andrew Crampton, Richard Hill

About the editors

Dr. Simon Parkinson is a Senior Lecturer in Computer Science in the School of Computing and Engineering, University of Huddersfield, UK.

Prof. Andrew Crampton is a Professor of Computational Mathematics in the School of Computing and Engineering, and the Associate Dean for Teaching and Learning at the University of Huddersfield.

Prof. Richard Hill is a Professor of Intelligent Systems, the Head of the Department of Informatics, and the Director of the Centre for Industrial Analytics at the University of Huddersfield. His other publications include the successful Springer titles Guide to Security Assurance for Cloud ComputingBig-Data Analytics and Cloud ComputingGuide to Cloud Computing, and Cloud Computing for Enterprise Architectures.

Bibliographic Information

Publish with us