The Cyber Security Network Guide

Bibliographic Details
Main Author: Fiedelholtz (Author)
Corporate Author: SpringerLink (Online service)
Summary:XV, 97 p. 18 illus., 16 illus. in color.
text
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2021.
Edition:1st ed. 2021.
Series:Studies in Systems, Decision and Control, 274
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-61591-8
Format: Electronic Book

MARC

LEADER 00000nam a22000005i 4500
001 978-3-030-61591-8
003 DE-He213
005 20240627172305.0
007 cr nn 008mamaa
008 201111s2021 sz | s |||| 0|eng d
020 |a 9783030615918  |9 978-3-030-61591-8 
024 7 |a 10.1007/978-3-030-61591-8  |2 doi 
050 4 |a TA345-345.5 
072 7 |a UN  |2 bicssc 
072 7 |a COM018000  |2 bisacsh 
072 7 |a UN  |2 thema 
082 0 4 |a 620.00285  |2 23 
100 1 |a Fiedelholtz.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 4 |a The Cyber Security Network Guide  |h [electronic resource] /  |c by Fiedelholtz. 
250 |a 1st ed. 2021. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2021. 
300 |a XV, 97 p. 18 illus., 16 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Studies in Systems, Decision and Control,  |x 2198-4190 ;  |v 274 
505 0 |a Pre-incident Planning and Analysis -- Incident Detection and Characterization -- Vulnerability/Consequence Analysis -- Incident Response and Recovery -- Cloud Architecture -- Lessons Learned. 
520 |a This book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats. It includes updated processes in response to asymmetric threats, as well as descriptions of the current tools to mitigate cyber threats. Featuring comprehensive computer science material relating to a complete network baseline with the characterization hardware and software configuration, the book also identifies potential emerging cyber threats and the vulnerabilities of the network architecture to provide students with a guide to responding to threats. The book is intended for undergraduate and graduate college students who are unfamiliar with the cyber paradigm and processes in responding to attacks. . 
650 0 |a Engineering  |x Data processing. 
650 0 |a Cooperating objects (Computer systems). 
650 1 4 |a Data Engineering. 
650 2 4 |a Cyber-Physical Systems. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783030615901 
776 0 8 |i Printed edition:  |z 9783030615925 
776 0 8 |i Printed edition:  |z 9783030615932 
830 0 |a Studies in Systems, Decision and Control,  |x 2198-4190 ;  |v 274 
856 4 0 |u https://doi.org/10.1007/978-3-030-61591-8 
912 |a ZDB-2-INR 
912 |a ZDB-2-SXIT 
950 |a Intelligent Technologies and Robotics (SpringerNature-42732) 
950 |a Intelligent Technologies and Robotics (R0) (SpringerNature-43728)