Cyber Security: Power and Technology (Record no. 78724)

000 -LEADER
fixed length control field 03891nam a22005775i 4500
001 - CONTROL NUMBER
control field 978-3-319-75307-2
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801220603.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180504s2018 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319753072
-- 978-3-319-75307-2
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
245 10 - TITLE STATEMENT
Title Cyber Security: Power and Technology
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2018.
300 ## - PHYSICAL DESCRIPTION
Number of Pages VIII, 288 p. 57 illus., 38 illus. in color.
490 1# - SERIES STATEMENT
Series statement Intelligent Systems, Control and Automation: Science and Engineering,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 I Cyber Power -- 1 Developing Political Response Framework to Cyber Hostilities -- 2 The modern strategies in the cyber warfare -- 3 Cyber Security Strategy Implementation Architecture in a Value System -- 4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force -- 5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere -- II Cyber in the Service of the Light Side of the Force -- 6 Real-time application-layer DDoS attacks detection in encrypted traffic -- 7 Domain Generation Algorithms (DGA) detection using machine learning methods -- 8 Tailorable Representation of Security Control Catalog on Semantic Wiki -- 9 Password Cracking -- 10 Game Console attacking -- 11 OS Attacks -- 12 Honeypot utilization for network intrusion detection -- 13 Testing framework for intrusion detection systems in encrypted traffic -- 14 Security Challenges of IoT-based Smart Home Appliances.
520 ## - SUMMARY, ETC.
Summary, etc This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.
700 1# - AUTHOR 2
Author 2 Lehto, Martti.
700 1# - AUTHOR 2
Author 2 Neittaanmäki, Pekka.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-319-75307-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2018.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic data processing—Management.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Models of Computation.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- IT Operations.
700 1# - AUTHOR 2
-- (orcid)0000-0002-8122-3155
-- https://orcid.org/0000-0002-8122-3155
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2213-8994 ;
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.