Table of contents: ch. 1 Introduction 1.1.Trends 1.2.Data Mining and Security Technologies 1.3.Data Mining for Email Worm Detection 1.4.Data Mining for Malicious Code Detection 1.5.Data Mining for Detecting Remote Exploits 1.6.Data Mining for Botnet Detection 1.7.Stream Data Mining 1.8.Emerging Data Mining Tools for Cyber Security Applications 1.9.Organization of This Book 1.10.Nex…