pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: DATA MINING TOOLS FOR MALWARE DETECTION
By: Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
Format: Electronic book text

List price: £62.99


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 146651647X
ISBN 13: 9781466516472
Publisher: TAYLOR & FRANCIS INC
Pub. date: 2 February, 2012
Synopsis: Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets. The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations. Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data miningIncludes four appendices that provide a firm foundation in data management, secure systems, and the semantic webDescribes the authors' tools for stream data miningFrom algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.
Illustrations: 1-50 equations
Publication: US
Imprint: Auerbach Publishers Inc.
Returns: Non-returnable
Some other items by this author:
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING (PB)
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING (PB)
ANALYZING AND SECURING SOCIAL NETWORKS
ANALYZING AND SECURING SOCIAL NETWORKS
ANALYZING AND SECURING SOCIAL NETWORKS (HB)
BIG DATA ANALYTICS WITH APPLICATIONS IN INSIDER THREAT DETECTION
BIG DATA ANALYTICS WITH APPLICATIONS IN INSIDER THREAT DETECTION
BIG DATA ANALYTICS WITH APPLICATIONS IN INSIDER THREAT DETECTION (HB)
BUILDING TRUSTWORTHY SEMANTIC WEBS
BUILDING TRUSTWORTHY SEMANTIC WEBS
BUILDING TRUSTWORTHY SEMANTIC WEBS (HB)
COLONIALISM AND THE MODERNIST MOMENT IN THE EARLY NOVELS OF JEAN RHYS
DATA AND APPLICATION SECURITY (PB)
DATA MINING
DATA MINING
DATA MINING TOOLS FOR MALWARE DETECTION
DATA MINING TOOLS FOR MALWARE DETECTION
DATA MINING TOOLS FOR MALWARE DETECTION (HB)
DATABASE AND APPLICATIONS SECURITY
DATABASE AND APPLICATIONS SECURITY
DATABASE AND APPLICATIONS SECURITY
DATABASE AND APPLICATIONS SECURITY
DATABASE AND APPLICATIONS SECURITY
DESIGN AND IMPLEMENTATION OF DATA MINING TOOLS
DESIGN AND IMPLEMENTATION OF DATA MINING TOOLS
DESIGN AND IMPLEMENTATION OF DATA MINING TOOLS (HB)
DEVELOPING AND SECURING THE CLOUD
DEVELOPING AND SECURING THE CLOUD (HB)
DIGITAL NATIONAL SECURITY
DIGITAL NATIONAL SECURITY (HB)
KNOWLEDGE MANAGEMENT (PB)
MANAGING AND MINING MULTIMEDIA DATABASES
MANAGING AND MINING MULTIMEDIA DATABASES (HB)
MULTIMEDIA DATA MINING AND KNOWLEDGE DISCOVERY (HB)
MULTIMEDIA DATA MINING AND KNOWLEDGE DISCOVERY (PB)
MULTIMEDIA DATABASE MANAGEMENT SYSTEMS (PB)
SECURE DATA PROVENANCE AND INFERENCE CONTROL WITH SEMANTIC WEB
SECURE DATA PROVENANCE AND INFERENCE CONTROL WITH SEMANTIC WEB
SECURE DATA PROVENANCE AND INFERENCE CONTROL WITH SEMANTIC WEB (HB)
SECURE DATA SCIENCE
SECURE DATA SCIENCE (HB)
SECURE SEMANTIC SERVICE ORIENTED SYSTEMS (HB)
SECURE SEMANTIC SERVICE-ORIENTED SYSTEMS
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY MANAGEMENT, INTEGRITY, AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
THE CHANGING LANDSCAPE OF THE ACADEMIC PROFESSION
THE CHANGING LANDSCAPE OF THE ACADEMIC PROFESSION
THE CHANGING LANDSCAPE OF THE ACADEMIC PROFESSION
THE CHANGING LANDSCAPE OF THE ACADEMIC PROFESSION
THE CHANGING LANDSCAPE OF THE ACADEMIC PROFESSION
THE CHANGING LANDSCAPE OF THE ACADEMIC PROFESSION
WEB AND INFORMATION SECURITY
WEB DATA MANAGEMENT AND ELECTRONIC COMMERCE
WEB DATA MANAGEMENT AND ELECTRONIC COMMERCE
WEB DATA MINING AND APPLICATIONS IN BUSINESS INTELLIGENCE AND COUNTER-TERRORISM
WEB DATA MINING AND APPLICATIONS IN BUSINESS INTELLIGENCE AND COUNTER-TERRORISM (HB)
XML DATABASES AND THE SEMANTIC WEB
XML DATABASES AND THE SEMANTIC WEB
XML DATABASES AND THE SEMANTIC WEB (HB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket