Cyber denial, deception and counter deception: a framework for supporting active cyber Defense
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2015]
|
Schriftenreihe: | Advances in Information Security
64 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (XV, 251 Seiten, 30 illus., 28 illus. in color) |
ISBN: | 9783319251332 |
ISSN: | 1568-2633 |
DOI: | 10.1007/978-3-319-25133-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209795 | ||
003 | DE-604 | ||
005 | 20160714 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319251332 |c Online |9 978-3-319-25133-2 | ||
024 | 7 | |a 10.1007/978-3-319-25133-2 |2 doi | |
035 | |a (OCoLC)932036643 | ||
035 | |a (DE-599)BVBBV043209795 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Heckman, Kristin E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber denial, deception and counter deception |b a framework for supporting active cyber Defense |c Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow |
264 | 1 | |a Cham |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online Ressource (XV, 251 Seiten, 30 illus., 28 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v volume 64 |x 1568-2633 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Informatik | |
700 | 1 | |a Stech, Frank J. |e Verfasser |4 aut | |
700 | 1 | |a Thomas, Roshan K. |e Verfasser |4 aut | |
700 | 1 | |a Schmoker, Ben |e Verfasser |4 aut | |
700 | 1 | |a Tsow, Alexander W. |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-25131-8 |
830 | 0 | |a Advances in Information Security |v 64 |w (DE-604)BV022281064 |9 64 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-25133-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632956&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632956&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632956 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25133-2 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175709265985536 |
---|---|
adam_text | CYBER DENIAL, DECEPTION AND COUNTER DECEPTION
/ HECKMAN, KRISTIN E.
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
BRIDGING THE CLASSICAL D&D AND CYBER SECURITY DOMAINS
INTRUSIONS, DECEPTIONS, AND CAMPAIGNS
CYBER D&D CASE STUDIES
EXERCISING CYBER-D&D
CONSIDERATIONS, ADAPTATION, AND SHARING
COUNTERING DENIAL & DECEPTION
CAPABILITY MATURITY MODEL
CYBER-D&D LIFECYCLE MANAGEMENT
LOOKING TO THE FUTURE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CYBER DENIAL, DECEPTION AND COUNTER DECEPTION
/ HECKMAN, KRISTIN E.
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK PRESENTS THE FIRST REFERENCE EXPOSITION OF THE CYBER-DECEPTION
CHAIN: A FLEXIBLE PLANNING AND EXECUTION FRAMEWORK FOR CREATING
TACTICAL, OPERATIONAL, OR STRATEGIC DECEPTIONS. THIS METHODOLOGY BRIDGES
THE GAP BETWEEN THE CURRENT UNCOORDINATED PATCHWORK OF TACTICAL DENIAL
AND DECEPTION (D&D) TECHNIQUES AND THEIR ORCHESTRATION IN SERVICE OF AN
ORGANIZATION’S MISSION. CONCEPTS FOR CYBER- D&D PLANNING OPERATIONS
AND MANAGEMENT ARE DETAILED WITHIN THE LARGER ORGANIZATIONAL, BUSINESS,
AND CYBER DEFENSE CONTEXT. IT EXAMINES THE NECESSITY OF A COMPREHENSIVE,
ACTIVE CYBER DENIAL SCHEME. THE AUTHORS EXPLAIN THE ORGANIZATIONAL
IMPLICATIONS OF INTEGRATING D&D WITH A LEGACY CYBER STRATEGY, AND
DISCUSS TRADE-OFFS, MATURITY MODELS, AND LIFECYCLE MANAGEMENT. CHAPTERS
PRESENT THE PRIMARY CHALLENGES IN USING DECEPTION AS PART OF A SECURITY
STRATEGY, AND GUIDES USERS THROUGH THE STEPS TO OVERCOME COMMON
OBSTACLES. BOTH REVEALING AND CONCEALING FACT AND FICTION HAVE A
CRITICAL ROLE IN SECURING PRIVATE INFORMATION. DETAILED CASE STUDIES ARE
INCLUDED. CYBER DENIAL, DECEPTION AND COUNTER DECEPTION IS DESIGNED AS A
REFERENCE FOR PROFESSIONALS, RESEARCHERS AND GOVERNMENT EMPLOYEES
WORKING IN CYBERSECURITY. ADVANCED-LEVEL STUDENTS IN COMPUTER SCIENCE
FOCUSED ON SECURITY WILL ALSO FIND THIS BOOK USEFUL AS A REFERENCE OR
SECONDARY TEXT BOOK.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Heckman, Kristin E. Stech, Frank J. Thomas, Roshan K. Schmoker, Ben Tsow, Alexander W. |
author_facet | Heckman, Kristin E. Stech, Frank J. Thomas, Roshan K. Schmoker, Ben Tsow, Alexander W. |
author_role | aut aut aut aut aut |
author_sort | Heckman, Kristin E. |
author_variant | k e h ke keh f j s fj fjs r k t rk rkt b s bs a w t aw awt |
building | Verbundindex |
bvnumber | BV043209795 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)932036643 (DE-599)BVBBV043209795 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-25133-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03882nmm a2200709zcb4500</leader><controlfield tag="001">BV043209795</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160714 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319251332</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-25133-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-25133-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932036643</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209795</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Heckman, Kristin E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber denial, deception and counter deception</subfield><subfield code="b">a framework for supporting active cyber Defense</subfield><subfield code="c">Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XV, 251 Seiten, 30 illus., 28 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">volume 64</subfield><subfield code="x">1568-2633</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stech, Frank J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thomas, Roshan K.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schmoker, Ben</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsow, Alexander W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-25131-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Information Security</subfield><subfield code="v">64</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">64</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632956&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632956&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632956</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25133-2</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209795 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:36Z |
institution | BVB |
isbn | 9783319251332 |
issn | 1568-2633 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632956 |
oclc_num | 932036643 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online Ressource (XV, 251 Seiten, 30 illus., 28 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Advances in Information Security |
series2 | Advances in information security |
spelling | Heckman, Kristin E. Verfasser aut Cyber denial, deception and counter deception a framework for supporting active cyber Defense Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow Cham Springer [2015] © 2015 1 Online Ressource (XV, 251 Seiten, 30 illus., 28 illus. in color) txt rdacontent c rdamedia cr rdacarrier Advances in information security volume 64 1568-2633 Computer science Computer security Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik Stech, Frank J. Verfasser aut Thomas, Roshan K. Verfasser aut Schmoker, Ben Verfasser aut Tsow, Alexander W. Verfasser aut Erscheint auch als Druckausgabe 978-3-319-25131-8 Advances in Information Security 64 (DE-604)BV022281064 64 https://doi.org/10.1007/978-3-319-25133-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632956&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632956&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Heckman, Kristin E. Stech, Frank J. Thomas, Roshan K. Schmoker, Ben Tsow, Alexander W. Cyber denial, deception and counter deception a framework for supporting active cyber Defense Advances in Information Security Computer science Computer security Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik |
title | Cyber denial, deception and counter deception a framework for supporting active cyber Defense |
title_auth | Cyber denial, deception and counter deception a framework for supporting active cyber Defense |
title_exact_search | Cyber denial, deception and counter deception a framework for supporting active cyber Defense |
title_full | Cyber denial, deception and counter deception a framework for supporting active cyber Defense Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow |
title_fullStr | Cyber denial, deception and counter deception a framework for supporting active cyber Defense Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow |
title_full_unstemmed | Cyber denial, deception and counter deception a framework for supporting active cyber Defense Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow |
title_short | Cyber denial, deception and counter deception |
title_sort | cyber denial deception and counter deception a framework for supporting active cyber defense |
title_sub | a framework for supporting active cyber Defense |
topic | Computer science Computer security Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik |
topic_facet | Computer science Computer security Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik |
url | https://doi.org/10.1007/978-3-319-25133-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632956&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632956&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT heckmankristine cyberdenialdeceptionandcounterdeceptionaframeworkforsupportingactivecyberdefense AT stechfrankj cyberdenialdeceptionandcounterdeceptionaframeworkforsupportingactivecyberdefense AT thomasroshank cyberdenialdeceptionandcounterdeceptionaframeworkforsupportingactivecyberdefense AT schmokerben cyberdenialdeceptionandcounterdeceptionaframeworkforsupportingactivecyberdefense AT tsowalexanderw cyberdenialdeceptionandcounterdeceptionaframeworkforsupportingactivecyberdefense |