Cyber-security threats, actors, and dynamic mitigation / (Record no. 127598)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 03350cam a22005058i 4500 |
| 001 - CONTROL NUMBER | |
| control field | 9781003006145 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | FlBoTFG |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220509192957.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
| fixed length control field | m d u |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr ||||||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 201009s2021 flu ob 001 0 eng |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | OCoLC-P |
| Language of cataloging | eng |
| Description conventions | rda |
| Transcribing agency | OCoLC-P |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781003006145 |
| -- | (ebook) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1003006140 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781000366600 |
| -- | (electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 100036660X |
| -- | (electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781000366617 |
| -- | (electronic bk. : EPUB) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1000366618 |
| -- | (electronic bk. : EPUB) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Cancelled/invalid ISBN | 9780367433314 |
| -- | (hardback) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)1200831869 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC-P)1200831869 |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | LAW |
| Subject category code subdivision | 041000 |
| Source | bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | TEC |
| Subject category code subdivision | 020000 |
| Source | bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | COM |
| Subject category code subdivision | 053000 |
| Source | bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | JKVF1 |
| Source | bicssc |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 23 |
| 245 00 - TITLE STATEMENT | |
| Title | Cyber-security threats, actors, and dynamic mitigation / |
| Statement of responsibility, etc | edited by Nicholas Kolokotronis and Stavros Shiaeles. |
| 264 #1 - | |
| -- | Boca Raton : |
| -- | CRC Press, |
| -- | 2021. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 online resource |
| 336 ## - | |
| -- | text |
| -- | txt |
| -- | rdacontent |
| 337 ## - | |
| -- | computer |
| -- | n |
| -- | rdamedia |
| 338 ## - | |
| -- | online resource |
| -- | nc |
| -- | rdacarrier |
| 505 2# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Cyber-attackers' profiling / Dimitris Kavallieros (University of the Peloponnese, Center for Security Studies, Georgios Germanos (Univeristy of the Peloponnese, Nicholas Kolokotronis (University of the Peloponnese) |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "This book provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modelling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modelling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often"-- |
| -- | Provided by publisher. |
| 588 ## - | |
| -- | OCLC-licensed vendor bibliographic record. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer crimes |
| General subdivision | Prevention. |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | LAW / Forensic Science |
| Source of heading or term | bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | TECHNOLOGY / Manufacturing |
| Source of heading or term | bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | COMPUTERS / Security / General |
| Source of heading or term | bisacsh |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Kolokotronis, Nicholas, |
| Relator term | editor. |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Shiaeles, Stavros, |
| Relator term | editor. |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Materials specified | Taylor & Francis |
| Uniform Resource Identifier | https://www.taylorfrancis.com/books/9781003006145 |
| 856 42 - ELECTRONIC LOCATION AND ACCESS | |
| Materials specified | OCLC metadata license agreement |
| Uniform Resource Identifier | http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
No items available.