Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation (Record no. 6527)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03383naaaa2200445uu 4500 |
001 - CONTROL NUMBER | |
control field | https://directory.doabooks.org/handle/20.500.12854/95748 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230418153056.0 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | oapen |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr|mn|---annan |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 20230105s2022 xx |||||o ||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781680838350 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781680838343 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | oapen |
Transcribing agency | oapen |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1561/9781680838350 |
Terms of availability | doi |
041 0# - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
042 ## - AUTHENTICATION CODE | |
Authentication code | dc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Sargsyan, Gohar |
Relationship | edt |
245 10 - TITLE STATEMENT | |
Title | Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Name of publisher, distributor, etc. | Now Publishers |
Date of publication, distribution, etc. | 2022 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 electronic resource (234 p.) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | NowOpen |
506 0# - RESTRICTIONS ON ACCESS NOTE | |
Terms governing access | Open Access |
Source of term | star |
Standardized terminology for access restriction | Unrestricted online access |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics. |
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE | |
Terms governing use and reproduction | Creative Commons |
Use and reproduction rights | https://creativecommons.org/licenses/by-nc/4.0/ |
Source of term | cc |
-- | https://creativecommons.org/licenses/by-nc/4.0/ |
546 ## - LANGUAGE NOTE | |
Language note | English |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
Source of heading or term | bicssc |
653 ## - INDEX TERM--UNCONTROLLED | |
Uncontrolled term | Cybersecurity, AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, security architectures, system and data integrity, trust management systems, distributed systems security and dynamic risk management |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kavallieros, Dimitrios |
Relationship | edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kolokotronis, Nicholas |
Relationship | edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Sargsyan, Gohar |
Relationship | oth |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kavallieros, Dimitrios |
Relationship | oth |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kolokotronis, Nicholas |
Relationship | oth |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Host name | www.oapen.org |
Uniform Resource Identifier | <a href="https://library.oapen.org/bitstream/20.500.12657/60496/1/9781680838350.pdf">https://library.oapen.org/bitstream/20.500.12657/60496/1/9781680838350.pdf</a> |
Access status | 0 |
Public note | DOAB: download the publication |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Host name | www.oapen.org |
Uniform Resource Identifier | <a href="https://directory.doabooks.org/handle/20.500.12854/95748">https://directory.doabooks.org/handle/20.500.12854/95748</a> |
Access status | 0 |
Public note | DOAB: description of the publication |
909 ## - Составили записи | |
-- | 4 |
-- | Darya Shvetsova |
-- | 4 |
-- | Darya Shvetsova |
No items available.