Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Big data technologies for monitoring...
~
Petrenko, Sergei.
Linked to FindBook
Google Book
Amazon
博客來
Big data technologies for monitoring of computer security = a case study of the Russian Federation /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Big data technologies for monitoring of computer security/ by Sergei Petrenko.
Reminder of title:
a case study of the Russian Federation /
Author:
Petrenko, Sergei.
Published:
Cham :Springer International Publishing : : 2018.,
Description:
xxvii, 249 p. :ill., digital ;24 cm.
[NT 15003449]:
1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion.
Contained By:
Springer eBooks
Subject:
Intrusion detection systems (Computer security) - Case studies. -
Online resource:
http://dx.doi.org/10.1007/978-3-319-79036-7
ISBN:
9783319790367
Big data technologies for monitoring of computer security = a case study of the Russian Federation /
Petrenko, Sergei.
Big data technologies for monitoring of computer security
a case study of the Russian Federation /[electronic resource] :by Sergei Petrenko. - Cham :Springer International Publishing :2018. - xxvii, 249 p. :ill., digital ;24 cm.
1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion.
This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.
ISBN: 9783319790367
Standard No.: 10.1007/978-3-319-79036-7doiSubjects--Topical Terms:
3331882
Intrusion detection systems (Computer security)
--Case studies.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.83
Big data technologies for monitoring of computer security = a case study of the Russian Federation /
LDR
:02697nmm a2200325 a 4500
001
2145875
003
DE-He213
005
20180517153854.0
006
m d
007
cr nn 008maaau
008
190227s2018 gw s 0 eng d
020
$a
9783319790367
$q
(electronic bk.)
020
$a
9783319790350
$q
(paper)
024
7
$a
10.1007/978-3-319-79036-7
$2
doi
035
$a
978-3-319-79036-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.83
$2
23
090
$a
TK5105.59
$b
.P494 2018
100
1
$a
Petrenko, Sergei.
$3
3331881
245
1 0
$a
Big data technologies for monitoring of computer security
$h
[electronic resource] :
$b
a case study of the Russian Federation /
$c
by Sergei Petrenko.
260
$a
Cham :
$c
2018.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xxvii, 249 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion.
520
$a
This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.
650
0
$a
Intrusion detection systems (Computer security)
$v
Case studies.
$3
3331882
650
0
$a
Big data
$v
Case studies.
$3
3331883
650
0
$a
Computer security
$v
Case studies.
$3
1001092
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Security.
$3
3134865
650
2 4
$a
Big Data/Analytics.
$3
2186785
650
2 4
$a
International Security Studies.
$3
3222152
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-79036-7
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9347391
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login