|
|
|
|
| LEADER |
00000nam a22000005i 4500 |
| 001 |
978-3-030-61591-8 |
| 003 |
DE-He213 |
| 005 |
20240627172305.0 |
| 007 |
cr nn 008mamaa |
| 008 |
201111s2021 sz | s |||| 0|eng d |
| 020 |
|
|
|a 9783030615918
|9 978-3-030-61591-8
|
| 024 |
7 |
|
|a 10.1007/978-3-030-61591-8
|2 doi
|
| 050 |
|
4 |
|a TA345-345.5
|
| 072 |
|
7 |
|a UN
|2 bicssc
|
| 072 |
|
7 |
|a COM018000
|2 bisacsh
|
| 072 |
|
7 |
|a UN
|2 thema
|
| 082 |
0 |
4 |
|a 620.00285
|2 23
|
| 100 |
1 |
|
|a Fiedelholtz.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
| 245 |
1 |
4 |
|a The Cyber Security Network Guide
|h [electronic resource] /
|c by Fiedelholtz.
|
| 250 |
|
|
|a 1st ed. 2021.
|
| 264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2021.
|
| 300 |
|
|
|a XV, 97 p. 18 illus., 16 illus. in color.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Studies in Systems, Decision and Control,
|x 2198-4190 ;
|v 274
|
| 505 |
0 |
|
|a Pre-incident Planning and Analysis -- Incident Detection and Characterization -- Vulnerability/Consequence Analysis -- Incident Response and Recovery -- Cloud Architecture -- Lessons Learned.
|
| 520 |
|
|
|a This book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats. It includes updated processes in response to asymmetric threats, as well as descriptions of the current tools to mitigate cyber threats. Featuring comprehensive computer science material relating to a complete network baseline with the characterization hardware and software configuration, the book also identifies potential emerging cyber threats and the vulnerabilities of the network architecture to provide students with a guide to responding to threats. The book is intended for undergraduate and graduate college students who are unfamiliar with the cyber paradigm and processes in responding to attacks. .
|
| 650 |
|
0 |
|a Engineering
|x Data processing.
|
| 650 |
|
0 |
|a Cooperating objects (Computer systems).
|
| 650 |
1 |
4 |
|a Data Engineering.
|
| 650 |
2 |
4 |
|a Cyber-Physical Systems.
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer Nature eBook
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783030615901
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783030615925
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783030615932
|
| 830 |
|
0 |
|a Studies in Systems, Decision and Control,
|x 2198-4190 ;
|v 274
|
| 856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-61591-8
|
| 912 |
|
|
|a ZDB-2-INR
|
| 912 |
|
|
|a ZDB-2-SXIT
|
| 950 |
|
|
|a Intelligent Technologies and Robotics (SpringerNature-42732)
|
| 950 |
|
|
|a Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
|