Cantitate/Preț
Produs

Cyber Security: Power and Technology: Intelligent Systems, Control and Automation: Science and Engineering, cartea 93

Editat de Martti Lehto, Pekka Neittaanmäki
en Limba Engleză Hardback – 23 mai 2018
This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.

Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 63610 lei  39-44 zile
  Springer International Publishing – 3 ian 2019 63610 lei  39-44 zile
  Springer International Publishing – 4 apr 2023 101301 lei  6-8 săpt.
Hardback (3) 86153 lei  39-44 zile +7582 lei  7-13 zile
  Springer – 10 iun 2015 93779 lei  18-23 zile +7582 lei  7-13 zile
  Springer International Publishing – 23 mai 2018 86153 lei  39-44 zile
  Springer International Publishing – 3 apr 2022 101934 lei  6-8 săpt.

Din seria Intelligent Systems, Control and Automation: Science and Engineering

Preț: 86153 lei

Preț vechi: 113359 lei
-24% Nou

Puncte Express: 1292

Preț estimativ în valută:
15245 17877$ 13388£

Carte tipărită la comandă

Livrare economică 09-14 februarie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319753065
ISBN-10: 3319753061
Pagini: 296
Ilustrații: VIII, 288 p. 57 illus., 38 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seria Intelligent Systems, Control and Automation: Science and Engineering

Locul publicării:Cham, Switzerland

Cuprins

I Cyber Power.- 1 Developing Political Response Framework to Cyber Hostilities.- 2 The modern strategies in the cyber warfare.- 3 Cyber Security Strategy Implementation Architecture in a Value System.- 4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force.- 5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere.- II Cyber in the Service of the Light Side of the Force.- 6 Real-time application-layer DDoS attacks detection in encrypted traffic.- 7 Domain Generation Algorithms (DGA) detection using machine learning methods.- 8 Tailorable Representation of Security Control Catalog on Semantic Wiki.- 9 Password Cracking.- 10 Game Console attacking.- 11 OS Attacks.- 12 Honeypot utilization for network intrusion detection.- 13 Testing framework for intrusion detection systems in encrypted traffic.- 14 Security Challenges of IoT-based Smart Home Appliances.

Textul de pe ultima copertă

This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.


Caracteristici

Includes contributions from top scientists in the field Offers a comprehensive, “one-stop” resource Presents real-world examples

Notă biografică

Dr. Martti Lehto, (Military Sciences), Col (GS) (ret.) works as a Professor (Cyber security) in the University of Jyväskylä in the Faculty of Information Technology. He has over 30 years’ experience as developer and leader of C4ISR Systems in Finnish Defence Forces. He served for 30 years in the Finnish Air Force where his last position was Deputy Chief of Staff for Logistics and Armaments in Air Force Command. Now he is Cyber security and Cyber defence researcher and teacher in the IT Faculty. He teaches in MSc and PhD level in the University of Jyväskylä, National Defence University, and Air Force Academy. He is also Adjunct professor in National Defence University in Air and Cyber Warfare. He has participated Finland’s parliament hearings annually from 2013. His research areas are Cyber Security strategy, Cyber Warfare, Cyber Security in Aviation, Cyber security in the Healthcare system, and Critical Infrastructure Protection. Since 2001 he has been the Editor-in-Chief ofthe Military Magazine.
 Dr. Pekka Neittaanmäki works as Professor, UNESCO Chair in the University of Jyväskylä. He was the Professor in Information Technology, Numerical Analysis, and Its Applications, in the University of Jyväskylä, 1988–2019. He worked the Dean of the Faculty of Information Technology in the University of Jyväskylä, 2010–2017, the Head of COMAS (Computing and Mathematical Sciences) Graduate School in the University of Jyväskylä, 1995–1999, 2003–2016, the Chairman of Agora Human Centered Information Technology Research Center of the University of Jyväskylä, 2002–2009 and the Vice Rector in the University of Jyväskylä, 1993–2000. He is also the Visiting Professor in the Tokyo Institute of Technology, Japan from 2008 and Adjunct Professor in the University of Houston, USA from 2000. His research Interests are among others reliable computing, optimization, optimal control and logistics, computational methodology in nanotechnology, computational mechanics, dynamical systems and attractors, signal and data processing, big data analytics, critical infrastructure protection, innovative learning, digital service platforms and data analysis, optimization, and simulation in public healthcare.

Recenzii

“This wonderfully documented text explores themechanics and methods of digital security and the steps necessary to ensureprivacy. … For the professional who is mathematically literate, the book is a must-read.The reference sections that follow each chapter rival that of any PhD thesisever written. It is magnificent in its scholarship.” (James Van Speybroeck, ComputingReviews, October, 2015)