𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cyber Security: Analytics, Technology and Automation

✍ Scribed by Martti Lehto, Pekka NeittaanmÀki (eds.)


Publisher
Springer International Publishing
Year
2015
Tongue
English
Leaves
268
Series
Intelligent Systems, Control and Automation: Science and Engineering 78
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.

The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

✦ Table of Contents


Front Matter....Pages i-x
Front Matter....Pages 1-1
Phenomena in the Cyber World....Pages 3-29
Cyber World as a Social System....Pages 31-43
Citizens in Cyber Worldβ€”Despatches from the Virtual β€œClinic”....Pages 45-62
Powers and Fundamental Rights in Cyber Security....Pages 63-70
Front Matter....Pages 71-71
Coder, Hacker, Soldier, Spy....Pages 73-87
Cyber Warfare....Pages 89-96
Deception in the Cyber-World....Pages 97-107
Legal Framework of Cyber Security....Pages 109-127
Finnish Cyber Security Strategy and Implementation....Pages 129-144
Front Matter....Pages 145-145
Clustering-Based Protocol Classification via Dimensionality Reduction....Pages 147-182
Timing and Side Channel Attacks....Pages 183-194
Knowledge Discovery from Network Logs....Pages 195-203
Trusted Computing and DRM....Pages 205-212
Front Matter....Pages 213-213
Cyber Security and Protection of ICS Systems: An Australian Example....Pages 215-228
Towards Dependable Automation....Pages 229-249
Specialized Honeypots for SCADA Systems....Pages 251-269

✦ Subjects


Systems and Data Security; Communications Engineering, Networks; Security Science and Technology


πŸ“œ SIMILAR VOLUMES


Cyber Security: Analytics, Technology an
✍ Martti Lehto, Pekka NeittaanmΓ€ki πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing 🌐 English

Contains a unique codification of cyber security Excellent book for students, postgraduates and professionals Gives a profound overview of the most spoken phenomenon of this time <p>The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social p

Cyber Security: Analytics, Technology an
✍ Martti Lehto, Pekka Neittaanmaki πŸ“‚ Library πŸ“… 2015 πŸ› Springer 🌐 English

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a

The NICE Cyber Security Framework: Cyber
✍ Izzat Alsmadi πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<p><span>This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) de

The NICE Cyber Security Framework: Cyber
✍ Izzat Alsmadi πŸ“‚ Library πŸ“… 2019 πŸ› Springer International Publishing 🌐 English

<p>This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three

The NICE Cyber Security Framework: Cyber
✍ Izzat Alsmadi πŸ“‚ Library πŸ“… 2023 πŸ› Springer Nature 🌐 English

This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described i