SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: AI-Powered Digital Cyber Resilience

AI-Powered Digital Cyber Resilience

AI-Powered Digital Cyber Resilience

Omar Santos og Petar Radanliev
(2026)
Sprog: Engelsk
Pearson Education, Limited
268,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 15 hverdage

Detaljer om varen

  • Paperback: 400 sider
  • Udgiver: Pearson Education, Limited (Marts 2026)
  • Forfattere: Omar Santos og Petar Radanliev
  • ISBN: 9780135408605

Use AI to Predict, Prevent, and Protect Against the Next Cyber Attack

From cybersecurity leader Omar Santos and AI expert Dr. Petar Radanliev comes a groundbreaking guide to the future of cyber defense. This book is a practical guide to building intelligent, AI-powered cyber defenses in today's fast-evolving threat landscape. With cyber threats growing in speed, scale, and sophistication, traditional defenses can no longer keep up. This essential book shows how to use AI technologies to detect threats earlier, respond faster and build stronger digital resilience.

Designed for IT professionals, security analysts, engineers, executives, academics, and students, this guide bridges the gap between advanced AI technologies and real-world cybersecurity strategies. Whether you are managing enterprise networks, leading a security team, or preparing for a career in digital defense, this book will help you use AI to protect your most valuable assets.

As ransomware attacks, data breaches, and zero-day exploits rise, organizations must move from reactive defense to proactive resilience. This book explains how technologies such as generative AI, large language models (LLMs), and small language models (SLMs) enable real-time threat detection, automated incident response, and predictive threat analysis.

This book delivers:

  • Clear explanations of AI technologies such as large language models (LLMs), generative AI, and behavior-based analytics.
  • Hands-on strategies for leveraging AI to boost detection, response, recovery, and resilience.
  • Case studies and practical tools to help you apply cutting-edge defense methods in real-world environments.

By reading AI-Powered Digital Cyber Resilience, you will:

  • Understand the fundamentals of digital cyber resilience in an AI-driven world and why traditional security methods are no longer enough.
  • Gain deep insight into generative AI, large language models (LLMs), small language models (SLMs), and how they are transforming cybersecurity.
  • Apply AI-based techniques for real-time threat detection, anomaly detection, and predictive threat forecasting.
  • Implement AI-driven incident response strategies, including automated orchestration and real-time decision-making.
  • Secure IoT devices and cloud infrastructures using machine learning, behavioral analytics, and AI-powered access control.
  • Use advanced encryption, data privacy tools, and compliance frameworks powered by intelligent automation.
  • Build and enhance cybersecurity programs and policies with AI integration for better governance and risk management.
  • Ensure secure and ethical AI deployments, including continuous model updates and protection against adversarial attacks.

Don't wait for the next cyberattack. Take control with the knowledge and tools you need to build lasting digital resilience. AI-Powered Digital Cyber Resilience is your essential guide to navigating and mastering the future of cybersecurity.

Preface..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xix Acknowledgments..
.
.
.
.
.
.
.
.
.
.
.
.
. xxvii About the Authors..
.
.
.
.
.
.
.
.
.
.
.
.
. xxix 1 Understanding Digital Cyber Resilience in the Age of AI
..
.
.
. 1
Chapter Objectives
.
.
.
.
.
.
.
.
.
.
.
.
. 1 Resilience: Beyond Legacy Cybersecurity Concepts
.
.
.
.
.
. 3 The NIST Four Pillars of Resilience.
.
.
.
.
.
.
.
.
. 4 From Technical Defense to Digital Trust..
.
.
.
.
.
.
. 12 The AI Revolution: A Duality of Threat and Defense..
.
.
.
.
. 15 Summary.
.
.
.
.
.
.
.
.
.
.
.
.
. 19 Test Your Skills.
.
.
.
.
.
.
.
.
.
.
.
. 21 Multiple-Choice Questions
.
.
.
.
.
.
.
.
.
.
. 21 Answers to Multiple-Choice Questions.
.
.
.
.
.
.
.
. 23 Exercise/Project: Build a Cyber Resilience Playbook for AI-Era Threats
.
.
. 24 2 Introduction to Generative AI, LLMs, and SLMs..
.
.
.
.
. 27
Chapter Objectives..
.
.
.
.
.
.
.
.
.
.
. 27 Overview of AI Technologies and Algorithms.
.
.
.
.
.
. 28 Introduction to Generative AI, LLMs, and SLMs..
.
.
.
.
.
. 31 The Future of AI in Cybersecurity, Emerging Trends, and Technologies..
. 35 Integration and Interoperability of AI in Cybersecurity.
.
.
.
.
. 37 Challenges in Implementing AI Security Solutions.
.
.
.
.
. 39 Strategies for Seamless Integration of AI and Cybersecurity.
.
.
.
. 41 Integrating Malware Analysis with AI-Driven Cybersecurity.
.
.
.
. 43 Summary.
.
.
.
.
.
.
.
.
.
.
.
.
. 46 References.
.
.
.
.
.
.
.
.
.
.
.
.
. 46 Test Your Skills.
.
.
.
.
.
.
.
.
.
.
.
. 49 Multiple-Choice Questions..
.
.
.
.
.
.
.
.
.
. 49 Answers to Multiple-Choice Questions.
.
.
.
.
.
.
.
. 50 EXERCISES AND ANSWERS (Interview Style)
.
.
.
.
.
.
.
. 51 3 Anomaly Detection, Predictive Analysis, and Threat Forecasting
..
. 55
Chapter Objectives
.
.
.
.
.
.
.
.
.
.
.
. 55 Overview of Anomaly Detection.
.
.
.
.
.
.
.
.
. 56 Importance of Predictive Analysis in Cybersecurity..
.
.
.
.
. 59 Machine Learning Algorithms: SVM, Decision Trees, Neural Networks.
.
. 62 Statistical Methods: ARIMA, GARCH..
.
.
.
.
.
.
.
. 64 Techniques for Feature Selection and Extraction..
.
.
.
.
.
. 66 Metrics for Model Performance: Accuracy, Precision, Recall, F1-Score..
.
. 68 Tools and Libraries for Predictive Modeling: Scikit-learn, TensorFlow.
.
. 70 Integrating Dynamic Malware Analysis with Anomaly Detection and Predictive Models... 72 Summary.
.
.
.
.
.
.
.
.
.
.
.
.
. 74 References.
.
.
.
.
.
.
.
.
.
.
.
.
. 75 Test Your Skills.
.
.
.
.
.
.
.
.
.
.
.
. 76 Multiple-Choice Questions..
.
.
.
.
.
.
.
.
.
. 76 Answers to Multiple-Choice Questions.
.
.
.
.
.
.
.
. 77 EXERCISES AND ANSWERS (Interview Style)
.
.
.
.
.
.
.
. 78 4 AI-Driven Threat Intelligence..
.
.
.
.
.
.
.
.
. 81
Chapter Objectives
.
.
.
.
.
.
.
.
.
.
.
. 81 Technical Aspects of AI in Threat Intelligence.
.
.
.
.
.
. 81 Case Study: Using CNNs for Malware Classification..
.
.
.
.
. 84 Case Study: Detecting and Analyzing Phishing Campaigns..
.
.
.
. 85 Leveraging AI to Automate STIX Document Creation for Threat Intelligence. 87 Case Study: Automating Threat Intelligence for a Financial Institution..
. 92 Autonomous AI Agents for Cyber Defense
.
.
.
.
.
.
.
. 94 Case Study: Using MegaVul to Build an AI-Powered Vulnerability Detector.
. 95 AI Coding Agents..
.
.
.
.
.
.
.
.
.
.
. 103 Summary.
.
.
.
.
.
.
.
.
.
.
.
.
. 112 Test Your Skills.
.
.
.
.
.
.
.
.
.
.
.
. 114 Multiple-Choice Questions
.
.
.
.
.
.
.
.
.
.
. 114 Answers to Multiple-Choice Questions.
.
.
.
.
.
.
. 116 EXERCISES..
.
.
.
.
.
.
.
.
.
.
.
.
. 117 5 Introduction to AI-Driven Incident Response..
.
.
.
.
. 121
Chapter Objectives..
.
.
.
.
.
.
.
.
.
.
. 121 Foundations of Cybersecurity Incident Response.
.
.
.
.
. 122 Understanding the Traditional Cybersecurity Incident Response Process..
. 123 The Functions of Incident Response Teams..
.
.
.
.
.
. 127 The Emergence of Artificial Intelligence in Cybersecurity Incident Response.
.
.
.
.
.
.
.
.
.
.
. 134 Summary.
.
.
.
.
.
.
.
.
.
.
.
.
. 147 Test Your Skills.
.
.
.
.
.
.
.
.
.
.
.
. 148 Multiple-Choice Questions..
.
.
.
.
.
.
.
.
.
. 148 Answers to Multiple-Choice Questions.
.
.
.
.
.
.
. 150 Project 5-1: Automated Vulnerability Triage and Patching Workflow..
.
. 151 6 Real-Time Analysis, Decision-Making, Orchestration, and Automation.
.. 153
Chapter Objectives
.
.
.
.
.
.
.
.
.
.
.
. 153 Real-Time Analysis.
.
.
.
.
.
.
.
.
.
.
. 154 AI-Driven Decision-Making..
.
.
.
.
.
.
.
.
.
. 166 The Pitfalls of AI in Security.
.
.
.
.
.
.
.
.
.
. 169 Orchestration and Automation.
.
.
.
.
.
.
.
.
. 172 The Integrated Defense: SOAR and Proactive Resilience in Practice.
.
. 175 Summary.
.
.
.
.
.
.
.
.
.
.
.
.
. 180 Test Your Skills.
.
.
.
.
.
.
.
.
.
.
.
. 182 Answers to Multiple-Choice Questions.
.
.
.
.
.
.
. 185 7 IoT Security and Cloud Security Using AI..
.
.
.
.
.
. 187
Chapter Objectives..
.
.
.
.
.
.
.
.
.
.
. 187 Definition of IoT and Cloud Security.
.
.
.
.
.
.
.
. 188 IoT Security Challenges.
.
.
.
.
.
.
.
.
.
. 191 Vulnerabilities in IoT Devices.
.
.
.
.
.
.
.
.
. 195 Case Studies of IoT Security Breaches.
.
.
.
.
.
.
.
. 197 Cloud Security Challenges..
.
.
.
.
.
.
.
.
.
. 200 The Application of AI in IoT Security.
.
.
.
.
.
.
.
. 202 The Application of AI in Cloud Security.
.
.
.
.
.
.
. 206 Limitations of Using Low-Memory AI in IoT and Cloud Security.
.
.
. 208 Future Trends in AI-Enhanced IoT and Cloud Security..
.
.
.
. 210 Best Practices and Recommendations..
.
.
.
.
.
.
. 213 Enhancing IoT and Cloud Security Using Dynamic and Static Malware Analysis.. 215 Summary.
.
.
.
.
.
.
.
.
.
.
.
.
. 218 References.
.
.
.
.
.
.
.
.
.
.
.
.
. 218 Test Your Skills.
.
.
.
.
.
.
.
.
.
.
.
. 220 Multiple-Choice Questions
.
.
.
.
.
.
.
.
.
.
. 220 Answers to Multiple-Choice Questions.
.
.
.
.
.
.
. 221 EXERCISES AND ANSWERS (Interview Style)..
.
.
.
.
.
. 222 8 Advanced Encryption Techniques, Privacy, and Compliance..
.
. 225
Chapter Objectives..
.
.
.
.
.
.
.
.
.
.
. 225 AI in Cryptography..
.
.
.
.
.
.
.
.
.
.
. 226 Enhancing Data Security.
.
.
.
.
.
.
.
.
.
. 229 Decentralization for Balancing Security with Privacy..
.
.
.
.
. 232 Privacy-Preserving Techniques..
.
.
.
.
.
.
.
.
. 235 Homomorphic Encryption..
.
.
.
.
.
.
.
.
.
. 237 AI and Regulatory Compliance..
.
.
.
.
.
.
.
.
. 240 Advanced Encryption Techniques and the Role of Malware in Encryption.
. 248 Summary.
.
.
.
.
.
.
.
.
.
.
.
.
. 251 References.
.
.
.
.
.
.
.
.
.
.
.
.
. 251 Test Your Skills.
.
.
.
.
.
.
.
.
.
.
.
. 253 Multiple-Choice Questions..
.
.
.
.
.
.
.
.
.
. 253 Answers to Multiple-Choice Questions.
.
.
.
.
.
.
. 254 EXERCISES AND ANSWERS (Interview Style)
.
.
.
.
.
.
. 255 9 Using AI to Enhance Cybersecurity Programs and Policies..
.
. 257
Chapter Objectives..
.
.
.
.
.
.
.
.
.
.
. 257 Dynamic Security Policies: Implementation and Adaptation of AI in Security Policies..
. 258 AI-Driven Security Adjustments: Real-Time Threat Detection and Response Mechanisms..
. 264 Enhancing the Software Development Lifecycle (SDLC): AI Integration in SDLC for Improved Security..
. 268 AI-Powered Cyber
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Fysisk eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.