• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Cybersecurity in Digital Transformation: Scope and Applications » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Cybersecurity in Digital Transformation: Scope and Applications

ISBN-13: 9783030605698 / Angielski / Miękka / 2020 / 114 str.

Dietmar P. F. Möller
Cybersecurity in Digital Transformation: Scope and Applications M 9783030605698 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Cybersecurity in Digital Transformation: Scope and Applications

ISBN-13: 9783030605698 / Angielski / Miękka / 2020 / 114 str.

Dietmar P. F. Möller
cena 201,24
(netto: 191,66 VAT:  5%)

Najniższa cena z 30 dni: 192,74
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!
Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - Network Security
Computers > Artificial Intelligence - General
Mathematics > Prawdopodobieństwo i statystyka
Wydawca:
Springer
Seria wydawnicza:
Springerbriefs on Cyber Security Systems and Networks
Język:
Angielski
ISBN-13:
9783030605698
Rok wydania:
2020
Wydanie:
2020
Numer serii:
000826847
Ilość stron:
114
Waga:
0.20 kg
Wymiary:
23.39 x 15.6 x 0.74
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

1       Cybersecurity in Digital Transformation

1.1     Digital Transformation

1.2     Cybersecurity

1.3     Fourth Technological Wave

1.4     Circular Economy

References

2        Introduction to Cybersecurity

2.1     Introduction

2.2     CIA Triad

2.3     Cyber Threat Attacks and Cyber Threat Intensions

2.4     Security Risk, Likelihood, and Consequence Level 

2.5     Risk Matrix

2.6     Cyber Threat Attack Types

2.7     Cybersecurity is still Paramount

References

3        Threat Intelligence

3.1     Introduction

3.2     Threat Intelligence Methodological Approach

3.3     Known-Knowns, Known-Unknowns, Unknown-Unknowns

3.4     Digital Forensic and Threat Intelligence Platforms

3.5     Threat Attack Profiling, Threat Intelligence, Threat Lifecycle

3.6     Threat Intelligence Sharing and Management Platform

References

4        Intrusion Detection and Prevention

4.1     Intrusion Detection

4.1.1         Anomaly Intrusion Detection

4.1.2         Misuse  Intrusion Detection

4.1.3         Disadvantages of  Anomaly and Misuse Intrusion Detection

4.1.4         Specification-based Intrusion Detection

4.1.5         Intrusion Type Characteristics and Detection

4.1.6         Intrusion Detection System Architecture

4.2     Intrusion  Prevention

4.2.1         Intrusion Prevention System

4.2.2         Intrusion Prevention System Architecture

4.3     Intrusion Detection and Prevention Architecture

4.4     Intrusion Detection Capability Metric

4.5     Intrusion Detection and Prevention Methods

References

5        Machine Learning and Deep Learning

5.1     Introduction to Machine Learning

5.2     Types of Machine Learning

5.2.1         Comparison of Machine Learning Methods

5.3     Machine Learning for Intrusion Detection

5.4     Introduction to Deep Learning

5.4.1         Deep Learning Methods used in Cybersecurity

References

6        Attack Models and Scenarios

6.1     Introduction

6.2     Attack Models and Scenarios

6.3     Adversary Behavior Modeling

6.3.1         Adversary Attack Behavior Modeling

6.3.2         Adversary Cyber Threat Simulation Modeling

References

7        Cybersecurity Ontology

7.1     Introduction

7.2     Ontology Types

7.3     Cybersecurity Ontology

References

8        Cybersecurity Leadership

8.1     Introduction

8.2     Roadmap to Cybersecurity Leadership

8.3     Digital Master

References

Acronym

Prof. Dr. Dietmar P. F. Möller is a Professor in computer engineering. In this position he worked together with industry in different projects and lead EU-US Joint Consortia for Cooperation in Higher Education and Vocational Education and Training. He received grants from the German Research Foundation (DFG) and from the German Federal Ministry of Education and Research (BMBF) for a centre of excellene in Aviation together with partners from industry and universities. In 2016 he received a grant from DAAD and UGC for an Indo German Research and Education project on Cyber-Physical Systems and Cybersecurity, and in 2020 a project founded by MIIT in intelligent manufacturing. In 2016 he published the book “Guide to Computing Fundamentals in Cyber-Physical Systems – Concepts, Design Methods, and Applications”, by Springer Publ. This book has also been translated into Chinese language by Springer Publ. in 2018. In 2019 the book “Guide to Automotive Connectivity and Cybersecurity – Trends, Technologies, Innovations, and Applications” was also published by Springer Publ., and in the same year the book “Smart Technologies – Scopes and Applications” was published by Springer Publ., too. Prof. Dr. Möller has published in total 12 books, more than 200 papers, more than 20 contributions in book chapters, and has given more than 150 presentations at international and national conferences. Prof, Dr. Möller has also received several awards for his scientific research work.

This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. 

The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capability which call for sophisticated cybersecurity protecting digital technologies of digital transformation.

Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide.  Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool. 



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia