Verkauf durch Sack Fachmedien

Neittaanmäki / Lehto

Cyber Security: Analytics, Technology and Automation

Medium: Buch
ISBN: 978-3-319-35203-9
Verlag: Springer International Publishing
Erscheinungstermin: 09.10.2016
Lieferfrist: bis zu 10 Tage

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.

The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.


Produkteigenschaften


  • Artikelnummer: 9783319352039
  • Medium: Buch
  • ISBN: 978-3-319-35203-9
  • Verlag: Springer International Publishing
  • Erscheinungstermin: 09.10.2016
  • Sprache(n): Englisch
  • Auflage: Softcover Nachdruck of the original 1. Auflage 2015
  • Serie: Intelligent Systems, Control and Automation: Science and Engineering
  • Produktform: Kartoniert, Previously published in hardcover
  • Gewicht: 4787 g
  • Seiten: 269
  • Format (B x H x T): 155 x 235 x 15 mm
  • Ausgabetyp: Kein, Unbekannt
Autoren/Hrsg.

Herausgeber

Part I Cyber World Today.- 1 Phenomenon in the Cyber World.- 2 Cyber World as a Social System.- 3 Citizens in Cyber World – Despatches from the Virtual "Clinic".- 4 Powers and Fundamental Rights in Cyber Security.- Part II: Cyber Security Threats, Legality and Strategy.- 1 Coder, Hacker, Soldier, Spy.- 2 Cyber Warfare.- 3 Deception in the Cyber-World.- 4 Legal Framework of Cyber Security.- 5 Finnish Cyber Security Strategy and Implementation.- Part III Cyber Security Technology.- 1 Clustering-Based Protocol Classification via Dimensionality Reduction.- 2 Timing and Side Channel Attacks.- 3 Knowledge Discovery from Network Logs.- 4 Trusted Computing and DRM.- Part IV Cyber Security and Automation.- 1 Cyber Security and Protection of ICS Systems: An Australian Example.- 2 Towards Dependable Automation.- 3 Specialized Honeypots for SCADA Systems.