Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools: Lecture Notes in Computer Science, cartea 13300
Editat de Joanna Kołodziej, Matteo Repetto, Armend Duzhaen Limba Engleză Paperback – 7 apr 2022
We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 645.28 lei
- Preț: 410.88 lei
- 15% Preț: 580.46 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- Preț: 381.21 lei
- 20% Preț: 353.50 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 309.90 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 310.26 lei
- 20% Preț: 655.02 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 15% Preț: 438.59 lei
- 20% Preț: 591.51 lei
- 20% Preț: 649.49 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 607.39 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 20% Preț: 763.23 lei
- 17% Preț: 360.19 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.57 lei
- 20% Preț: 369.12 lei
- 20% Preț: 583.40 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 764.89 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.29 lei
Preț: 302.80 lei
Preț vechi: 378.49 lei
-20% Nou
Puncte Express: 454
Preț estimativ în valută:
57.95€ • 60.27$ • 48.50£
57.95€ • 60.27$ • 48.50£
Carte tipărită la comandă
Livrare economică 15-29 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031040351
ISBN-10: 303104035X
Pagini: 257
Ilustrații: XI, 257 p. 90 illus., 71 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.39 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 303104035X
Pagini: 257
Ilustrații: XI, 257 p. 90 illus., 71 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.39 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
A Reference Architecture for Management of Security Operations in Digital Service Chains.- Efficient flow monitoring in digital services.- Intelligent Transportation Systems -- models, challenges, security aspects.- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic.- Detecting unknown attacks through system behavior analysis.- Signature-based detection of botnet DDoS attacks.- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.- Blockchain-based task and information management in computational cloud systems.
Textul de pe ultima copertă
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios.
We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
Caracteristici
This book is open access, which means that you have free and unlimited access For persons engaged with modern computing environments and cyber-physical systems This book fills the gap between software management paradigms and cybersecurity models Provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects