°£Æí°áÁ¦, ½Å¿ëÄ«µå û±¸ÇÒÀÎ
īī¿ÀÆäÀÌ 3,000¿ø
(īī¿ÀÆäÀÌ 5¸¸¿ø ÀÌ»ó °áÁ¦½Ã, 4/1~4/30 ±â°£ Áß 1ȸ)
¿ì¸®Ä«µå 3õ¿ø/7õ¿ø/1¸¸ 5õ¿ø Áï½ÃÇÒÀÎ
3¸¸¿ø/5¸¸¿ø/10¸¸¿ø ÀÌ»ó °áÁ¦½Ã
»ï¼ºÄ«µå 6% (49,330¿ø)
(»ï¼ºÄ«µå 6% û±¸ÇÒÀÎ)
ÀÎÅÍÆÄÅ© ·Ôµ¥Ä«µå 5% (49,850¿ø)
(ÃÖ´ëÇÒÀÎ 10¸¸¿ø / Àü¿ù½ÇÀû 40¸¸¿ø)
ºÏÇǴϾð ·Ôµ¥Ä«µå 30% (36,730¿ø)
(ÃÖ´ëÇÒÀÎ 3¸¸¿ø / 3¸¸¿ø ÀÌ»ó °áÁ¦)
NH¼îÇÎ&ÀÎÅÍÆÄũīµå 20% (41,980¿ø)
(ÃÖ´ëÇÒÀÎ 4¸¸¿ø / 2¸¸¿ø ÀÌ»ó °áÁ¦)
Close

Malware Data Science (Paperback) : Attack Detection and Attribution[Paperback]

¼Òµæ°øÁ¦

2013³â 9¿ù 9ÀÏ ÀÌÈÄ ´©Àû¼öÄ¡ÀÔ´Ï´Ù.

°øÀ¯Çϱâ
Á¤°¡

53,000¿ø

  • 52,470¿ø (1%ÇÒÀÎ)

ÇÒÀÎÇýÅÃ
Àû¸³ÇýÅÃ
  • I-Point Àû¸³Àº Ãâ°í¿Ï·á ÈÄ 14ÀÏ À̳» ¸¶ÀÌÆäÀÌÁö¿¡¼­ Àû¸³¹Þ±âÇÑ °æ¿ì¸¸ Àû¸³µË´Ï´Ù.
Ãß°¡ÇýÅÃ
¹è¼ÛÁ¤º¸
ÁÖ¹®¼ö·®
°¨¼Ò Áõ°¡
  • À̺¥Æ®/±âȹÀü

  • ¿¬°üµµ¼­

  • »çÀºÇ°(3)

Ã¥¼Ò°³

Security has become a 'big data' problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist. In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualisation, and shows you how to apply these methods to malware detection and analysis.

ÀúÀÚ¼Ò°³

Saxe, Joshua/ Sanders, Hillary [Àú] ½ÅÀ۾˸² SMS½Åû ÀÛ°¡DBº¸±â
»ý³â¿ùÀÏ -
Ãâ»ýÁö -
Ãâ°£µµ¼­ 0Á¾
ÆÇ¸Å¼ö 0±Ç

ÇØ´çÀÛ°¡¿¡ ´ëÇÑ ¼Ò°³°¡ ¾ø½À´Ï´Ù.

ÄÄÇ»ÅÍ ºÐ¾ß¿¡¼­ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥

    ¸®ºä

    0.0 (ÃÑ 0°Ç)

    ±¸¸Å ÈÄ ¸®ºä ÀÛ¼º ½Ã, ºÏÇǴϾð Áö¼ö ÃÖ´ë 600Á¡

    ¸®ºä¾²±â

    ±â´ëÆò

    ÀÛ¼º½Ã À¯ÀÇ»çÇ×

    ÆòÁ¡
    0/200ÀÚ
    µî·ÏÇϱâ

    ±â´ëÆò

    0.0

    ±³È¯/ȯºÒ

    ±³È¯/ȯºÒ ¹æ¹ý

    ¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹Ýǰ/±³È¯/ȯºÒ¡¯ ¿¡¼­ ½ÅûÇÔ, 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¶Ç´Â °í°´¼¾ÅÍ(1577-2555) ÀÌ¿ë °¡´É

    ±³È¯/ȯºÒ °¡´É ±â°£

    °í°´º¯½ÉÀº Ãâ°í¿Ï·á ´ÙÀ½³¯ºÎÅÍ 14ÀÏ ±îÁö¸¸ ±³È¯/ȯºÒÀÌ °¡´ÉÇÔ

    ±³È¯/ȯºÒ ºñ¿ë

    °í°´º¯½É ¶Ç´Â ±¸¸ÅÂø¿ÀÀÇ °æ¿ì¿¡¸¸ 2,500¿ø Åùèºñ¸¦ °í°´´ÔÀÌ ºÎ´ãÇÔ

    ±³È¯/ȯºÒ ºÒ°¡»çÀ¯

    ¹ÝǰÁ¢¼ö ¾øÀÌ ¹Ý¼ÛÇϰųª, ¿ìÆíÀ¸·Î º¸³¾ °æ¿ì »óǰ È®ÀÎÀÌ ¾î·Á¿ö ȯºÒÀÌ ºÒ°¡ÇÒ ¼ö ÀÖÀ½
    ¹è¼ÛµÈ »óǰÀÇ ºÐ½Ç, »óǰÆ÷ÀåÀÌ ÈÑ¼ÕµÈ °æ¿ì, ºñ´Ò·¦ÇÎµÈ »óǰÀÇ ºñ´Ò °³ºÀ½Ã ±³È¯/¹ÝǰÀÌ ºÒ°¡´ÉÇÔ

    ¼ÒºñÀÚ ÇÇÇØº¸»ó

    ¼ÒºñÀÚ ÇÇÇØº¸»óÀÇ ºÐÀïó¸® µî¿¡ °üÇÑ »çÇ×Àº ¼ÒºñÀÚºÐÀïÇØ°á±âÁØ(°øÁ¤°Å·¡À§¿øÈ¸ °í½Ã)¿¡ µû¶ó ºñÇØ º¸»ó ¹ÞÀ» ¼ö ÀÖÀ½
    ±³È¯/¹Ýǰ/º¸ÁõÁ¶°Ç ¹× ǰÁúº¸Áõ ±âÁØÀº ¼ÒºñÀڱ⺻¹ý¿¡ µû¸¥ ¼ÒºñÀÚ ºÐÀï ÇØ°á ±âÁØ¿¡ µû¶ó ÇÇÇØ¸¦ º¸»ó ¹ÞÀ» ¼ö ÀÖÀ½

    ±âŸ

    µµ¸Å»ó ¹× Á¦ÀÛ»ç »çÁ¤¿¡ µû¶ó ǰÀý/ÀýÆÇ µîÀÇ »çÀ¯·Î ÁÖ¹®ÀÌ Ãë¼ÒµÉ ¼ö ÀÖÀ½(ÀÌ °æ¿ì ÀÎÅÍÆÄÅ©µµ¼­¿¡¼­ °í°´´Ô²² º°µµ·Î ¿¬¶ôÇÏ¿© °íÁöÇÔ)

    ¹è¼Û¾È³»

    • ÀÎÅÍÆÄÅ© µµ¼­ »óǰÀº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óǰÀ» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù

    • Ãâ°í°¡´É ½Ã°£ÀÌ ¼­·Î ´Ù¸¥ »óǰÀ» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óǰÀ» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.

    • ±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÏ¿©, ÀÎÅÍÆÄÅ© ¿Ü Ÿ¾÷ü ¹è¼Û»óǰÀÎ °æ¿ì ¹ß¼ÛµÇÁö ¾ÊÀ» ¼ö ÀÖ½À´Ï´Ù.

    • ¹è¼Ûºñ

    µµ¼­(Áß°íµµ¼­ Æ÷ÇÔ) ±¸¸Å

    2,000¿ø (1¸¸¿øÀÌ»ó ±¸¸Å ½Ã ¹«·á¹è¼Û)

    À½¹Ý/DVD/ÀâÁö/¸¸È­ ±¸¸Å

    2,000¿ø (2¸¸¿øÀÌ»ó ±¸¸Å ½Ã ¹«·á¹è¼Û)

    µµ¼­¿Í À½¹Ý/DVD/ÀâÁö/¸¸È­/
    Áß°íÁ÷¹è¼Û»óǰÀ» ÇÔ²² ±¸¸Å

    2,000¿ø (1¸¸¿øÀÌ»ó ±¸¸Å ½Ã ¹«·á¹è¼Û)

    ¾÷üÁ÷Á¢¹è¼Û»óǰ ±¸¸Å

    ¾÷üº° »óÀÌÇÑ ¹è¼Ûºñ Àû¿ë