ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Database Management / Database Mining

Data Mining Tools for Malware Detection

| £77.45 | €87.10 | Ca$125.65 | Au$124.00
by Mehedy Masud & Latifur Khan & Bhavani Thuraisingham
What is this?DRM-PDF | by download   add to wish list
Data Mining Tools for Malware Detection by Mehedy Masud & Latifur Khan & Bhavani Thuraisingham

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets. The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations. Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web Describes the authors' tools for stream data mining From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 732013

Ebook Details
Pages: 450
Size: 10.4 MB
Publisher: CRC Press
Date published:   2011
ISBN: 9781439854556 (DRM-PDF)

DRM Settings
Copying:not allowed
Printing:not allowed
Read Aloud:  not allowed

Territory Restrictions
This ebook will NOT be sold to customers with a billing address in:

This product is listed in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Database Management
Nonfiction > Computers > Database Management > Database Mining

These authors have products in the following categories:

Nonfiction > Technology
Nonfiction > Mathematics > Probability & Statistics
Nonfiction > Computers > Database Management
Nonfiction > Computers > Database Management > Database Mining
Nonfiction > Computers
Nonfiction > Computers > Internet
Nonfiction > Computers > Programming > Software Development
Nonfiction > Computers > Security

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016