Cyber-security threats, actors, and dynamic mitigation / (Record no. 71738)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03379cam a22005178i 4500 |
001 - CONTROL NUMBER | |
control field | 9781003006145 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220531132407.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m d u |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 201009s2021 flu ob 001 0 eng |
040 ## - Cataloging Source | |
-- | OCoLC-P |
-- | eng |
-- | rda |
-- | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781003006145 |
-- | (ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1003006140 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000366600 |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 100036660X |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000366617 |
-- | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000366618 |
-- | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367433314 |
-- | (hardback) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1200831869 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1200831869 |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - | |
-- | LAW |
-- | 041000 |
-- | bisacsh |
072 #7 - | |
-- | TEC |
-- | 020000 |
-- | bisacsh |
072 #7 - | |
-- | COM |
-- | 053000 |
-- | bisacsh |
072 #7 - | |
-- | JKVF1 |
-- | bicssc |
082 00 - | |
-- | 005.8 |
-- | 23 |
245 00 - TITLE STATEMENT | |
Title | Cyber-security threats, actors, and dynamic mitigation / |
Statement of responsibility, etc. | edited by Nicholas Kolokotronis and Stavros Shiaeles. |
264 #1 - | |
-- | Boca Raton : |
-- | CRC Press, |
-- | 2021. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | n |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | nc |
-- | rdacarrier |
505 2# - | |
-- | Cyber-attackers' profiling / Dimitris Kavallieros (University of the Peloponnese, Center for Security Studies, Georgios Germanos (Univeristy of the Peloponnese, Nicholas Kolokotronis (University of the Peloponnese) |
520 ## - | |
-- | "This book provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modelling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modelling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often"-- |
-- | Provided by publisher. |
588 ## - | |
-- | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes |
General subdivision | Prevention. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | LAW / Forensic Science |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | TECHNOLOGY / Manufacturing |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS / Security / General |
Source of heading or term | bisacsh |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kolokotronis, Nicholas, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Shiaeles, Stavros, |
Relator term | editor. |
856 40 - | |
-- | Taylor & Francis |
-- | https://www.taylorfrancis.com/books/9781003006145 |
856 42 - | |
-- | OCLC metadata license agreement |
-- | http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
No items available.