セキュリティ・データサイエンス<br>Secure Data Science : Integrating Cyber Security and Data Science

個数:

セキュリティ・データサイエンス
Secure Data Science : Integrating Cyber Security and Data Science

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 436 p.
  • 言語 ENG
  • 商品コード 9780367534103
  • DDC分類 006.312

Full Description

Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area—including healthcare, finance, manufacturing, and marketing—could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy. This is the first such book that provides a comprehensive overview of integrating both cyber security and data science and discusses both theory and practice in secure data science.

After an overview of security and privacy for big data services as well as cloud computing, this book describes applications of data science for cyber security applications. It also discusses such applications of data science as malware analysis and insider threat detection. Then this book addresses trends in adversarial machine learning and provides solutions to the attacks on the data science techniques. In particular, it discusses some emerging trends in carrying out trustworthy analytics so that the analytics techniques can be secured against malicious attacks. Then it focuses on the privacy threats due to the collection of massive amounts of data and potential solutions. Following a discussion on the integration of services computing, including cloud-based services for secure data science, it looks at applications of secure data science to information sharing and social media.

This book is a useful resource for researchers, software developers, educators, and managers who want to understand both the high level concepts and the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in secure data science. Furthermore, this book provides numerous references that would be helpful for the reader to get more details about secure data science.

Contents

Chapter 1 Introduction

PART I Supporting Technologies for Secure Data Science

Introduction to Part I

Chapter 2 Data Security and Privacy

Chapter 3 Data Mining and Security

Chapter 4 Big Data, Cloud, Semantic Web, and Social Network Technologies

Chapter 5 Big Data Analytics, Security, and Privacy

Conclusion to Part I

PART II Data Science for Cyber Security

Introduction to Part II

Chapter 6 Data Science for Malicious Executables

Chapter 7 Stream Analytics for Malware Detection

Chapter 8 Cloud-Based Data Science for Malware Detection

Chapter 9 Data Science for Insider Threat Detection

Conclusion to Part II

PART III Security and Privacy-Enhanced Data Science

Introduction to Part III

Chapter 10 Adversarial Support Vector Machine Learning

Chapter 11 Adversarial Learning Using Relevance Vector Machine Ensembles

Chapter 12 Privacy Preserving Decision Trees

Chapter 13 Toward a Privacy-Aware Policy-Based Quantified Self-Data Management Framework

Chapter 14 Data Science, COVID-19 Pandemic, Privacy, and Civil Liberties

Conclusion to Part III

PART IV Access Control and Data Science

Introduction to Part IV

Chapter 15 Secure Cloud Query Processing Based on Access Control for Big Data Systems

Chapter 16 Access Control-Based Assured Information Sharing in the Cloud

Chapter 17 Access Control for Social Network Data Management

Chapter 18 Inference and Access Control for Big Data

Chapter 19 Emerging Applications for Secure Data Science: Internet of Transportation Systems

Conclusion to Part IV

Chapter 20 Summary and Directions

Appendix A: Data Management Systems: Developments and Trends

最近チェックした商品