000 04425nam a22005895i 4500
001 978-3-030-19353-9
003 DE-He213
005 20220801214347.0
007 cr nn 008mamaa
008 200106s2020 sz | s |||| 0|eng d
020 _a9783030193539
_9978-3-030-19353-9
024 7 _a10.1007/978-3-030-19353-9
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aAdvances in Cyber Security Analytics and Decision Systems
_h[electronic resource] /
_cedited by Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXII, 145 p. 42 illus., 36 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aEAI/Springer Innovations in Communication and Computing,
_x2522-8609
505 0 _aChapter 1. Introduction -- Chapter 2. Security Design -- Chapter 3. Authentication -- Chapter 4. Authorization -- Chapter 5. Cryptography -- Chapter 6. Virtualization -- Chapter 7. Security principles -- Chapter 8. Malware -- Chapter 9. SQL Injection -- Chapter 10. DoS -- Chapter 11. Worms -- Chapter 12. Virus -- Chapter 13. Malicious Code -- Chapter 14. Intrusion Detection Systems -- Chapter 15. Vulnerability -- Chapter 16. Cyber Laws -- Chapter 17. Cyber Crime -- Chapter 18. Homeland Security -- Chapter 19. Cryptocurrency -- Chapter 20. BitCoin -- Chapter 21. Block chain -- Chapter 22. Phishing -- Chapter 23. Spoofing -- Chapter 24. Cyber War -- Chapter 25. Hacktivism -- Chapter 26. Distributed Denial of Service (DDoS) -- Chapter 27. Identity Fraud -- Chapter 28. Honeypot -- Chapter 29. Keylogging -- Chapter 30. Scareware -- Chapter 31. Spam -- Chapter 32. Sponsored Attacks -- Chapter 33. Sneakernet -- Chapter 34. Virtual Militray Technologies -- Chapter 35. Zero Day -- Chapter 36. Intrusion prevention system (IPS) -- Chapter 37. Macro virus -- Chapter 38. Wannacry -- Chapter 39. Conclusion.
520 _aThis book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others. Focuses on current theory, research, and results on cyber security and analytics Presents a variety of practical applications of cyber security measures Chapters written by global cyber security experts.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aSecurity systems.
_931879
650 0 _aComputer networks .
_931572
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aSecurity Science and Technology.
_931884
650 2 4 _aComputer Communication Networks.
_937909
700 1 _aShandilya, Shishir K.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_937910
700 1 _aWagner, Neal.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_937911
700 1 _aNagar, Atulya K.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_937912
710 2 _aSpringerLink (Online service)
_937913
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030193522
776 0 8 _iPrinted edition:
_z9783030193546
776 0 8 _iPrinted edition:
_z9783030193553
830 0 _aEAI/Springer Innovations in Communication and Computing,
_x2522-8609
_937914
856 4 0 _uhttps://doi.org/10.1007/978-3-030-19353-9
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76262
_d76262