The Cyber Security Network Guide: Studies in Systems, Decision and Control, cartea 274
Autor Fiedelholtzen Limba Engleză Paperback – 12 noi 2021
This book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats. It includes updated processes in response to asymmetric threats, as well as descriptions of the current tools to mitigate cyber threats.
Featuring comprehensive computer science material relating to a complete network baseline with the characterization hardware and software configuration, the book also identifies potential emerging cyber threats and the vulnerabilities of the network architecture to provide students with a guide to responding to threats.
The book is intended for undergraduate and graduate college students who are unfamiliar with the cyber paradigm and processes in responding to attacks.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 886.26 lei 6-8 săpt. | |
Springer International Publishing – 12 noi 2021 | 886.26 lei 6-8 săpt. | |
Hardback (1) | 892.13 lei 6-8 săpt. | |
Springer International Publishing – 12 noi 2020 | 892.13 lei 6-8 săpt. |
Din seria Studies in Systems, Decision and Control
- 18% Preț: 701.93 lei
- 20% Preț: 627.40 lei
- 15% Preț: 619.80 lei
- 18% Preț: 866.68 lei
- 18% Preț: 911.45 lei
- 20% Preț: 1412.23 lei
- Preț: 255.34 lei
- 18% Preț: 974.46 lei
- 15% Preț: 628.61 lei
- 20% Preț: 835.23 lei
- 18% Preț: 1070.11 lei
- 20% Preț: 934.24 lei
- 24% Preț: 726.59 lei
- 18% Preț: 966.72 lei
- 20% Preț: 924.72 lei
- 18% Preț: 972.18 lei
- 20% Preț: 896.89 lei
- 18% Preț: 969.17 lei
- 18% Preț: 723.94 lei
- 18% Preț: 962.34 lei
- 18% Preț: 961.57 lei
- 18% Preț: 978.26 lei
- 18% Preț: 913.73 lei
- 18% Preț: 1076.94 lei
- 18% Preț: 1358.61 lei
- 20% Preț: 1119.09 lei
- 18% Preț: 1073.93 lei
- 18% Preț: 753.54 lei
- 18% Preț: 916.01 lei
- 20% Preț: 1416.66 lei
- 18% Preț: 1339.64 lei
- 20% Preț: 1135.74 lei
- 18% Preț: 1508.16 lei
- 20% Preț: 946.88 lei
- 20% Preț: 355.93 lei
- 20% Preț: 1232.55 lei
- 18% Preț: 1522.57 lei
- 18% Preț: 1070.11 lei
- 20% Preț: 1015.92 lei
- 18% Preț: 1352.55 lei
- 18% Preț: 925.11 lei
- 20% Preț: 1013.53 lei
- 20% Preț: 1009.58 lei
- 18% Preț: 967.63 lei
- 18% Preț: 1179.43 lei
- 18% Preț: 1185.52 lei
- 18% Preț: 921.63 lei
- 18% Preț: 856.81 lei
Preț: 886.26 lei
Preț vechi: 1107.82 lei
-20% Nou
Puncte Express: 1329
Preț estimativ în valută:
169.63€ • 178.34$ • 141.09£
169.63€ • 178.34$ • 141.09£
Carte tipărită la comandă
Livrare economică 27 decembrie 24 - 10 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030615932
ISBN-10: 3030615936
Ilustrații: XV, 97 p. 18 illus., 16 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.17 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Studies in Systems, Decision and Control
Locul publicării:Cham, Switzerland
ISBN-10: 3030615936
Ilustrații: XV, 97 p. 18 illus., 16 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.17 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Studies in Systems, Decision and Control
Locul publicării:Cham, Switzerland
Cuprins
Pre-incident Planning and Analysis.- Incident Detection and Characterization.- Vulnerability/Consequence Analysis.- Incident Response and Recovery.- Cloud Architecture.- Lessons Learned.
Textul de pe ultima copertă
This book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats. It includes updated processes in response to asymmetric threats, as well as descriptions of the current tools to mitigate cyber threats.
Featuring comprehensive computer science material relating to a complete network baseline with the characterization hardware and software configuration, the book also identifies potential emerging cyber threats and the vulnerabilities of the network architecture to provide students with a guide to responding to threats.
The book is intended for undergraduate and graduate college students who are unfamiliar with the cyber paradigm and processes in responding to attacks.
Caracteristici
Provides a computer science technical foundational landscape for cyber practitioners Includes standard operating procedures, cyber operational documentation, and tools utilized in the event of a major cyber incident Presents in-depth background information for each step of the analytic process including pre-incident planning and analysis, incident detection and characterization, vulnerability/consequence analysis, and incident response and recovery Standardizes requirements for cyber-physical analysts and response practitioners