|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
EBSCO_on1125113013 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
191116s2019 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d MERUC
|d N$T
|d OCLCF
|d OCLCQ
|d K6U
|d OCLCO
|d OCLCQ
|d EBLCP
|d OCLCQ
|
020 |
|
|
|a 8770221154
|
020 |
|
|
|a 9788770221153
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000069393470
|
035 |
|
|
|a (OCoLC)1125113013
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Petrenko, Sergei.
|
245 |
1 |
0 |
|a Cyber Resilience
|
260 |
|
|
|a Aalborg :
|b River Publishers,
|c 2019.
|
300 |
|
|
|a 1 online resource (494 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a River Publishers Series in Security and Digital Forensics Ser.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Half Title; Series Page -- RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Title Page; Copyright Page; Contents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; List of Abbreviations; Glossary; Introduction; Chapter 1 -- Cyber Resilience Concept; 1.1 Cyber Security Threat Landscape; 1.1.1 APT Attack Research Results; 1.1.2 Known Attacker Methods; 1.1.3 Process Control System Cyber Security Threat; 1.2 Problem of the "Digital Bombs" Neutralization; 1.2.1 "Digital Bombs" Detection Problem; 1.2.2 Program Faults Detection Methods
|
505 |
8 |
|
|a 1.2.3 Introducing a Passport System for Programs1.2.4 "Digital Bombs" Neutralization Method; 1.3 Problem Statement of the Cyber Resilience Control; 1.3.1 Basic Definitions and Concepts of the Cyber Resilience; 1.3.2 Considering Trends and Prospects for Digital Transformation; 1.3.3 Mathematical Formulation of the Cyber Resilience Control Problem; Chapter 2 -- Cyber Risk Management; 2.1 Best Practices of Cyber Risk Management; 2.1.1 History of Cyber Risk Management Standards; 2.1.2 Methodological Recommendations for the Cyber Risks Management; 2.1.3 Method for Subjective Probability
|
505 |
8 |
|
|a 2.2 Cyber Resiliency Metric Development2.2.1 Possible Cyber Resiliency Metrics; 2.2.2 Predicate Functions; 2.2.3 Verification of Program Schemes; 2.3 Examples of Cyber Risk Management; 2.3.1 Example of Developing a Corporate Cyber Risk Management Methodology; 2.3.2 BIA Example -- Business Impact Analysis; 2.3.3 Toolkit for Cyber Risk Control; Chapter 3 -- Enterprise Cyber Resilience Program; 3.1 Business Continuity Management; 3.1.1 Business Continuity Management Practice; 3.1.2 Main Stages of BCM Life Cycle; 3.1.3 BCP/DRP Plan Development Recommendations
|
505 |
8 |
|
|a 3.2 Business Resilience Project Management3.2.1 Preparing a Business Resilience Project Plan; 3.2.2 Development of Predictive Models; 3.2.3 Development of the Dynamic Profiles; 3.3 Creating a Cyber Resilient Infrastructure; 3.3.1 Audit of Cyber Resilience Management System; 3.3.2 Designing a Cyber-Resilient Infrastructure; 3.3.3 Intellectual Cyber Resilience Orchestration; Conclusion; References; Index; About the Author; Back Cover
|
520 |
|
|
|a Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G +, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc. We should even consider the cyber resilience as a primary one, because the mentioned systems cannot exist without it. Indeed, without the sustainable formation mad.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
655 |
|
0 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Petrenko, Sergei.
|t Cyber Resilience.
|d Aalborg : River Publishers, ©2019
|z 9788770221160
|
830 |
|
0 |
|a River Publishers Series in Security and Digital Forensics Ser.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2277642
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL30251876
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2277642
|
994 |
|
|
|a 92
|b IZTAP
|