000 | 03891nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-319-75307-2 | ||
003 | DE-He213 | ||
005 | 20220801220603.0 | ||
007 | cr nn 008mamaa | ||
008 | 180504s2018 sz | s |||| 0|eng d | ||
020 |
_a9783319753072 _9978-3-319-75307-2 |
||
024 | 7 |
_a10.1007/978-3-319-75307-2 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aCyber Security: Power and Technology _h[electronic resource] / _cedited by Martti Lehto, Pekka Neittaanmäki. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aVIII, 288 p. 57 illus., 38 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aIntelligent Systems, Control and Automation: Science and Engineering, _x2213-8994 ; _v93 |
|
505 | 0 | _aI Cyber Power -- 1 Developing Political Response Framework to Cyber Hostilities -- 2 The modern strategies in the cyber warfare -- 3 Cyber Security Strategy Implementation Architecture in a Value System -- 4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force -- 5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere -- II Cyber in the Service of the Light Side of the Force -- 6 Real-time application-layer DDoS attacks detection in encrypted traffic -- 7 Domain Generation Algorithms (DGA) detection using machine learning methods -- 8 Tailorable Representation of Security Control Catalog on Semantic Wiki -- 9 Password Cracking -- 10 Game Console attacking -- 11 OS Attacks -- 12 Honeypot utilization for network intrusion detection -- 13 Testing framework for intrusion detection systems in encrypted traffic -- 14 Security Challenges of IoT-based Smart Home Appliances. | |
520 | _aThis book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aElectronic data processing—Management. _931699 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aModels of Computation. _931806 |
650 | 2 | 4 |
_aIT Operations. _931703 |
700 | 1 |
_aLehto, Martti. _eeditor. _0(orcid)0000-0002-8122-3155 _1https://orcid.org/0000-0002-8122-3155 _4edt _4http://id.loc.gov/vocabulary/relators/edt _951166 |
|
700 | 1 |
_aNeittaanmäki, Pekka. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _951167 |
|
710 | 2 |
_aSpringerLink (Online service) _951168 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319753065 |
776 | 0 | 8 |
_iPrinted edition: _z9783319753089 |
776 | 0 | 8 |
_iPrinted edition: _z9783030091972 |
830 | 0 |
_aIntelligent Systems, Control and Automation: Science and Engineering, _x2213-8994 ; _v93 _951169 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-75307-2 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78724 _d78724 |