Cyber security: analytics, technology and automation:
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2015
|
Schriftenreihe: | Intelligent systems, control and automation: science and engineering
78 |
Schlagworte: | |
Online-Zugang: | TUM01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | X, 269 p. 53 illus., 42 illus. in color |
ISBN: | 9783319183022 9783319183015 |
DOI: | 10.1007/978-3-319-18302-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042592265 | ||
003 | DE-604 | ||
005 | 20160215 | ||
007 | cr|uuu---uuuuu | ||
008 | 150602s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319183022 |c Online |9 978-3-319-18302-2 | ||
020 | |a 9783319183015 |c Print |9 978-3-319-18301-5 | ||
024 | 7 | |a 10.1007/978-3-319-18302-2 |2 doi | |
035 | |a (OCoLC)910759965 | ||
035 | |a (DE-599)BVBBV042592265 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1043 |a DE-B768 |a DE-Aug4 |a DE-898 |a DE-573 |a DE-859 |a DE-863 |a DE-634 |a DE-92 |a DE-862 |a DE-91 |a DE-861 |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ELT 000 |2 stub | ||
084 | |a MAS 000 |2 stub | ||
245 | 1 | 0 | |a Cyber security: analytics, technology and automation |c Martti Lehto ..., eds. |
264 | 1 | |a Cham [u.a.] |b Springer |c 2015 | |
300 | |a X, 269 p. 53 illus., 42 illus. in color | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Intelligent systems, control and automation: science and engineering |v 78 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Informatik | |
700 | 1 | |a Lehto, Matti |4 edt | |
830 | 0 | |a Intelligent systems, control and automation: science and engineering |v 78 |w (DE-604)BV024977557 |9 78 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-18302-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025477&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025477&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG |a ZDB-26-MYL | ||
940 | 1 | |q ZDB-2-ENG_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028025477 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=2096848 |l TUM01 |p ZDB-26-MYL |q TUM_PDA_MIL_gekauft |x Aggregator |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 563825 |
---|---|
_version_ | 1806179297910587392 |
adam_text | CYBER SECURITY: ANALYTICS, TECHNOLOGY AND AUTOMATION
/ LEHTO, MARTTI
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PART I CYBER WORLD TODAY
1 PHENOMENON IN THE CYBER WORLD
2 CYBER WORLD AS A SOCIAL SYSTEM
3 CITIZENS IN CYBER WORLD – DESPATCHES FROM THE VIRTUAL CLINIC
4 POWERS AND FUNDAMENTAL RIGHTS IN CYBER SECURITY
PART II: CYBER SECURITY THREATS, LEGALITY AND STRATEGY
1 CODER, HACKER, SOLDIER, SPY
2 CYBER WARFARE
3 DECEPTION IN THE CYBER-WORLD
4 LEGAL FRAMEWORK OF CYBER SECURITY
5 FINNISH CYBER SECURITY STRATEGY AND IMPLEMENTATION
PART III CYBER SECURITY TECHNOLOGY
1 CLUSTERING-BASED PROTOCOL CLASSIFICATION VIA DIMENSIONALITY REDUCTION
2 TIMING AND SIDE CHANNEL ATTACKS
3 KNOWLEDGE DISCOVERY FROM NETWORK LOGS
4 TRUSTED COMPUTING AND DRM
PART IV CYBER SECURITY AND AUTOMATION
1 CYBER SECURITY AND PROTECTION OF ICS SYSTEMS: AN AUSTRALIAN EXAMPLE
2 TOWARDS DEPENDABLE AUTOMATION
3 SPECIALIZED HONEYPOTS FOR SCADA SYSTEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CYBER SECURITY: ANALYTICS, TECHNOLOGY AND AUTOMATION
/ LEHTO, MARTTI
: 2015
ABSTRACT / INHALTSTEXT
OVER THE LAST TWO DECADES, THE INTERNET AND MORE BROADLY CYBERSPACE HAS
HAD A TREMENDOUS IMPACT ON ALL PARTS OF SOCIETY. GOVERNMENTS ACROSS THE
WORLD HAVE STARTED TO DEVELOP CYBER SECURITY STRATEGIES AND TO CONSIDER
CYBERSPACE AS AN INCREASINGLY IMPORTANT INTERNATIONAL ISSUE. THE BOOK,
IN ADDITION TO THE CYBER THREATS AND TECHNOLOGY, PROCESSES CYBER
SECURITY FROM MANY SIDES AS A SOCIAL PHENOMENON AND HOW THE
IMPLEMENTATION OF THE CYBER SECURITY STRATEGY IS CARRIED OUT. THE BOOK
GIVES A PROFOUND IDEA OF THE MOST SPOKEN PHENOMENON OF THIS TIME. THE
BOOK IS SUITABLE FOR A WIDE-RANGING AUDIENCE FROM GRADUATE TO
PROFESSIONALS/PRACTITIONERS AND RESEARCHERS. RELEVANT DISCIPLINES FOR
THE BOOK ARE TELECOMMUNICATIONS / NETWORK SECURITY, APPLIED
MATHEMATICS / DATA ANALYSIS, MOBILE SYSTEMS / SECURITY, ENGINEERING /
SECURITY OF CRITICAL INFRASTRUCTURE AND MILITARY SCIENCE / SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Lehto, Matti |
author2_role | edt |
author2_variant | m l ml |
author_facet | Lehto, Matti |
building | Verbundindex |
bvnumber | BV042592265 |
classification_tum | ELT 000 MAS 000 |
collection | ZDB-2-ENG ZDB-26-MYL |
ctrlnum | (OCoLC)910759965 (DE-599)BVBBV042592265 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik Maschinenbau |
doi_str_mv | 10.1007/978-3-319-18302-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02388nmm a2200505zcb4500</leader><controlfield tag="001">BV042592265</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160215 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150602s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319183022</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-18302-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319183015</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-18301-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-18302-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)910759965</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042592265</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ELT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAS 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security: analytics, technology and automation</subfield><subfield code="c">Martti Lehto ..., eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 269 p. 53 illus., 42 illus. in color</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Intelligent systems, control and automation: science and engineering</subfield><subfield code="v">78</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lehto, Matti</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Intelligent systems, control and automation: science and engineering</subfield><subfield code="v">78</subfield><subfield code="w">(DE-604)BV024977557</subfield><subfield code="9">78</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-18302-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025477&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025477&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield><subfield code="a">ZDB-26-MYL</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028025477</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=2096848</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-26-MYL</subfield><subfield code="q">TUM_PDA_MIL_gekauft</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042592265 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:06:47Z |
institution | BVB |
isbn | 9783319183022 9783319183015 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028025477 |
oclc_num | 910759965 |
open_access_boolean | |
owner | DE-1046 DE-1043 DE-B768 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-91 DE-BY-TUM DE-861 DE-706 |
owner_facet | DE-1046 DE-1043 DE-B768 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-91 DE-BY-TUM DE-861 DE-706 |
physical | X, 269 p. 53 illus., 42 illus. in color |
psigel | ZDB-2-ENG ZDB-26-MYL ZDB-2-ENG_2015 ZDB-26-MYL TUM_PDA_MIL_gekauft |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Intelligent systems, control and automation: science and engineering |
series2 | Intelligent systems, control and automation: science and engineering |
spellingShingle | Cyber security: analytics, technology and automation Intelligent systems, control and automation: science and engineering Computer science Data protection Telecommunication Computer Science Systems and Data Security Communications Engineering, Networks Security Science and Technology Informatik |
title | Cyber security: analytics, technology and automation |
title_auth | Cyber security: analytics, technology and automation |
title_exact_search | Cyber security: analytics, technology and automation |
title_full | Cyber security: analytics, technology and automation Martti Lehto ..., eds. |
title_fullStr | Cyber security: analytics, technology and automation Martti Lehto ..., eds. |
title_full_unstemmed | Cyber security: analytics, technology and automation Martti Lehto ..., eds. |
title_short | Cyber security: analytics, technology and automation |
title_sort | cyber security analytics technology and automation |
topic | Computer science Data protection Telecommunication Computer Science Systems and Data Security Communications Engineering, Networks Security Science and Technology Informatik |
topic_facet | Computer science Data protection Telecommunication Computer Science Systems and Data Security Communications Engineering, Networks Security Science and Technology Informatik |
url | https://doi.org/10.1007/978-3-319-18302-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025477&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025477&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV024977557 |
work_keys_str_mv | AT lehtomatti cybersecurityanalyticstechnologyandautomation |