Cyber Security: Power and Technology

This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Cham : Springer International Publishing, 2018.
Ausgabe:1st ed. 2018.
Schriftenreihe:Intelligent Systems, Control and Automation: Science and Engineering, 93
Schlagworte:
ISBN:9783319753072
ISSN:2213-8986 ;
Online-Zugang: Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000005i 4500
003 SK-BrCVT
005 20220618120149.0
007 cr nn 008mamaa
008 180504s2018 gw | s |||| 0|eng d
020 |a 9783319753072 
024 7 |a 10.1007/978-3-319-75307-2  |2 doi 
035 |a CVTIDW08215 
040 |a Springer-Nature  |b eng  |c CVTISR  |e AACR2 
041 |a eng 
245 1 0 |a Cyber Security: Power and Technology  |h [electronic resource] /  |c edited by Martti Lehto, Pekka Neittaanmäki. 
250 |a 1st ed. 2018. 
260 1 |a Cham :  |b Springer International Publishing,  |c 2018. 
300 |a VIII, 288 p. 57 illus., 38 illus. in color.  |b online resource. 
490 1 |a Intelligent Systems, Control and Automation: Science and Engineering,  |x 2213-8986 ;  |v 93 
500 |a Engineering  
505 0 |a I Cyber Power -- 1 Developing Political Response Framework to Cyber Hostilities -- 2 The modern strategies in the cyber warfare -- 3 Cyber Security Strategy Implementation Architecture in a Value System -- 4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force -- 5 Junk information in hybrid warfare - The rhizomatic speed of social media in the spamosphere -- II Cyber in the Service of the Light Side of the Force -- 6 Real-time application-layer DDoS attacks detection in encrypted traffic -- 7 Domain Generation Algorithms (DGA) detection using machine learning methods -- 8 Tailorable Representation of Security Control Catalog on Semantic Wiki -- 9 Password Cracking -- 10 Game Console attacking -- 11 OS Attacks -- 12 Honeypot utilization for network intrusion detection -- 13 Testing framework for intrusion detection systems in encrypted traffic -- 14 Security Challenges of IoT-based Smart Home Appliances. 
516 |a text file PDF 
520 |a This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others. 
650 0 |a Electrical engineering. 
650 0 |a Computer security. 
650 0 |a Computers. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
856 4 0 |u http://hanproxy.cvtisr.sk/han/cvti-ebook-springer-eisbn-978-3-319-75307-2  |y Vzdialený prístup pre registrovaných používateľov 
910 |b ZE05495 
919 |a 978-3-319-75307-2 
974 |a andrea.lebedova  |f Elektronické zdroje 
992 |a SUD 
999 |c 274548  |d 274548