The Global Cyber-Vulnerability Report (Record no. 59038)

000 -LEADER
fixed length control field 03507nam a22005775i 4500
001 - CONTROL NUMBER
control field 978-3-319-25760-0
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112554.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151209s2015 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319257600
-- 978-3-319-25760-0
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Subrahmanian, V.S.
245 14 - TITLE STATEMENT
Title The Global Cyber-Vulnerability Report
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 296 p. 399 illus., 398 illus. in color.
490 1# - SERIES STATEMENT
Series statement Terrorism, Security, and Computation,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis.
520 ## - SUMMARY, ETC.
Summary, etc This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored.  Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and  professionals including government and military workers, policy-makers and law-makers  working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
700 1# - AUTHOR 2
Author 2 Ovelgonne, Michael.
700 1# - AUTHOR 2
Author 2 Dumitras, Tudor.
700 1# - AUTHOR 2
Author 2 Prakash, Aditya.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-25760-0
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2015.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- System safety.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Statistics.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security Science and Technology.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Statistics for Social Science, Behavorial Science, Education, Public Policy, and Law.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems Applications (incl. Internet).
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial Intelligence (incl. Robotics).
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2197-8778
912 ## -
-- ZDB-2-SCS

No items available.