Cargando…

Managing Cyber Threats Issues, Approaches, and Challenges /

Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In rec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Kumar, Vipin (Editor ), Srivastava, Jaideep (Editor ), Lazarevic, Aleksandar (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Massive Computing, 5
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-0-387-24230-9
003 DE-He213
005 20220116004912.0
007 cr nn 008mamaa
008 100301s2005 xxu| s |||| 0|eng d
020 |a 9780387242309  |9 978-0-387-24230-9 
024 7 |a 10.1007/b104908  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM069000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Managing Cyber Threats  |h [electronic resource] :  |b Issues, Approaches, and Challenges /  |c edited by Vipin Kumar, Jaideep Srivastava, Aleksandar Lazarevic. 
250 |a 1st ed. 2005. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2005. 
300 |a XVIII, 334 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Massive Computing,  |x 2468-8738 ;  |v 5 
505 0 |a Overview -- Managing Threats to Web Databases and Cyber Systems -- Intrusion Detection: A Survey -- Data Mining Based Analysis of Computer Attacks -- Learning Rules and Clusters for Anomaly Detection in Network Traffic -- Statistical Causality Analysis of Infosec Alert Data -- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization -- Techniques for Managing Cyber Vulnerabilities and Alerts -- Early Detection of Active Internet Worms -- Sensor Families for Intrusion Detection Infrastructures -- Encapsulation of User's Intent: A New Proactive Intrusion Assessment Paradigm -- Topological Analysis of Network Attack Vulnerability -- Analyzing Survivable Computation in Critical Infrastructures -- Alert Management Systems: A Quick Introduction -- Cyber Forensics -- Cyber Forensics: Managing, Modeling, and Mining Data for Investigation -- Cyber Forensics: Issues and Approaches. 
520 |a Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats. This book brings together the latest techniques for managing cyber threats, developed by some of the world's leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance. Audience This book is intended for members of the computer security research and development community interested in state-of-the-art techniques; personnel in federal organizations tasked with managing cyber threats and information leaks from computer systems; personnel at the military and intelligence agencies tasked with defensive and offensive information warfare; personnel in the commercial sector tasked with detection and prevention of fraud in their systems; and personnel running large-scale data centers, either for their organization or for others, tasked with ensuring the security, integrity, and availability of data. 
650 0 |a Computer networks . 
650 0 |a Application software. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a Computer and Information Systems Applications. 
700 1 |a Kumar, Vipin.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Srivastava, Jaideep.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Lazarevic, Aleksandar.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9780387504575 
776 0 8 |i Printed edition:  |z 9781441937056 
776 0 8 |i Printed edition:  |z 9780387242262 
830 0 |a Massive Computing,  |x 2468-8738 ;  |v 5 
856 4 0 |u https://doi.uam.elogim.com/10.1007/b104908  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)