Amazon cover image
Image from Amazon.com
Image from Google Jackets
See Baker & Taylor
Image from Baker & Taylor

Data mining tools for malware detection Masud, Mehedy

By: Contributor(s): Material type: TextTextLanguage: Eng Publication details: London CRC Press 2012Description: 419p. 15.49 x 2.54 x 23.62 cmISBN:
  • 9781439854549
Subject(s): DDC classification:
  • 005.8 MAS
Summary: Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets. The authors describe the systems they have designed and devel
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Materials specified Status Date due Barcode
Books Books Rashtriya Raksha University 005.8 MAS (Browse shelf(Opens below)) Available 13853
Books Books Rashtriya Raksha University 005.8 MAS (Browse shelf(Opens below)) Available 13854
Books Books Rashtriya Raksha University 005.8 MAS (Browse shelf(Opens below)) Available 13855
Books Books Rashtriya Raksha University 005.8 MAS (Browse shelf(Opens below)) Available 13856
Books Books Rashtriya Raksha University 005.8 MAS (Browse shelf(Opens below)) Available 13857

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets. The authors describe the systems they have designed and devel

There are no comments on this title.

to post a comment.
© 2024 Rashtriya Raksha University, All Rights Reserved.