000 | 03674nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-030-69174-5 | ||
003 | DE-He213 | ||
005 | 20220801220440.0 | ||
007 | cr nn 008mamaa | ||
008 | 210707s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030691745 _9978-3-030-69174-5 |
||
024 | 7 |
_a10.1007/978-3-030-69174-5 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aSecurity Incidents & Response Against Cyber Attacks _h[electronic resource] / _cedited by Akashdeep Bhardwaj, Varun Sapra. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aVIII, 242 p. 110 illus., 91 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aEAI/Springer Innovations in Communication and Computing, _x2522-8609 |
|
505 | 0 | _aIntroduction -- By Failing to Prepare – You are preparing to Fail -- Authentication Methods and Applications -- Design of Blockchain Polynomial Digests to Secure Method Authentication -- Need of Cybersecurity for ERP Systems -- IoT – Architecture Vulnerabilities and Security Measures -- Cybersecurity Advanced Persistent Threat Attacks -- Securing Deep Learning Neural Networks -- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments -- Conclusion. | |
520 | _aThis book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry. Shares cases studies on using ML and AI to predict and preempt cyber attacks; Describes security attacks, trends, and scenarios along with attack vectors for various domains and industry sectors; Includes detail on incident planning, detection methods, containing incidents, and clean up and recovery. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aComputer crimes. _910774 |
|
650 | 0 |
_aPsychology, Industrial. _934059 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aCybercrime. _933477 |
650 | 2 | 4 |
_aIndustrial Psychology. _950371 |
700 | 1 |
_aBhardwaj, Akashdeep. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _950372 |
|
700 | 1 |
_aSapra, Varun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _950373 |
|
710 | 2 |
_aSpringerLink (Online service) _950374 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030691738 |
776 | 0 | 8 |
_iPrinted edition: _z9783030691752 |
776 | 0 | 8 |
_iPrinted edition: _z9783030691769 |
830 | 0 |
_aEAI/Springer Innovations in Communication and Computing, _x2522-8609 _950375 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-69174-5 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78577 _d78577 |