語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Guide to cybersecurity in digital tr...
~
Moller, Dietmar.
FindBook
Google Book
Amazon
博客來
Guide to cybersecurity in digital transformation = trends, methods, technologies, applications and best practices /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Guide to cybersecurity in digital transformation/ by Dietmar P.F. Moller.
其他題名:
trends, methods, technologies, applications and best practices /
作者:
Moller, Dietmar.
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
xviii, 420 p. :ill., digital ;24 cm.
內容註:
Foreword -- Preface -- 1 Cybersecurity in Digital Transformation -- 2 Threats and Threat Intelligence -- 3 Intrusion Detection and Prevention -- 4 Cyber-Attacker Profiles, Cyber-Attack Models and Scenarios, and Cybersecurity Ontology -- 5 NIST Cybersecurity Framework and MITRE Cybersecurity Criteria -- 6 Ransomware Attacks and Scenarios: Cost Factors and Loss of Reputation -- 7 Cybersecurity Maturity Models and SWOT Analysis -- 8 Machine Learning and Deep Learning -- Glossary -- Index.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-031-26845-8
ISBN:
9783031268458
Guide to cybersecurity in digital transformation = trends, methods, technologies, applications and best practices /
Moller, Dietmar.
Guide to cybersecurity in digital transformation
trends, methods, technologies, applications and best practices /[electronic resource] :by Dietmar P.F. Moller. - Cham :Springer Nature Switzerland :2023. - xviii, 420 p. :ill., digital ;24 cm. - Advances in information security,v. 1032512-2193 ;. - Advances in information security ;v. 103..
Foreword -- Preface -- 1 Cybersecurity in Digital Transformation -- 2 Threats and Threat Intelligence -- 3 Intrusion Detection and Prevention -- 4 Cyber-Attacker Profiles, Cyber-Attack Models and Scenarios, and Cybersecurity Ontology -- 5 NIST Cybersecurity Framework and MITRE Cybersecurity Criteria -- 6 Ransomware Attacks and Scenarios: Cost Factors and Loss of Reputation -- 7 Cybersecurity Maturity Models and SWOT Analysis -- 8 Machine Learning and Deep Learning -- Glossary -- Index.
In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach response - is central to defending organizations' interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks. Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals. Topics and features: Explores cybersecurity's impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networks Provides numerous examples of applications and best practices Considers methods that organizations can use to assess their cybersecurity awareness and/or strategy Describes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate data Addresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacks Discusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity Standard Gathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity. Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.
ISBN: 9783031268458
Standard No.: 10.1007/978-3-031-26845-8doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Guide to cybersecurity in digital transformation = trends, methods, technologies, applications and best practices /
LDR
:04046nmm a2200361 a 4500
001
2317017
003
DE-He213
005
20230418205522.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031268458
$q
(electronic bk.)
020
$a
9783031268441
$q
(paper)
024
7
$a
10.1007/978-3-031-26845-8
$2
doi
035
$a
978-3-031-26845-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
M726 2023
100
1
$a
Moller, Dietmar.
$3
3630708
245
1 0
$a
Guide to cybersecurity in digital transformation
$h
[electronic resource] :
$b
trends, methods, technologies, applications and best practices /
$c
by Dietmar P.F. Moller.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xviii, 420 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
2512-2193 ;
$v
v. 103
505
0
$a
Foreword -- Preface -- 1 Cybersecurity in Digital Transformation -- 2 Threats and Threat Intelligence -- 3 Intrusion Detection and Prevention -- 4 Cyber-Attacker Profiles, Cyber-Attack Models and Scenarios, and Cybersecurity Ontology -- 5 NIST Cybersecurity Framework and MITRE Cybersecurity Criteria -- 6 Ransomware Attacks and Scenarios: Cost Factors and Loss of Reputation -- 7 Cybersecurity Maturity Models and SWOT Analysis -- 8 Machine Learning and Deep Learning -- Glossary -- Index.
520
$a
In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach response - is central to defending organizations' interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks. Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals. Topics and features: Explores cybersecurity's impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networks Provides numerous examples of applications and best practices Considers methods that organizations can use to assess their cybersecurity awareness and/or strategy Describes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate data Addresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacks Discusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity Standard Gathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity. Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Digital and Analog Signal Processing.
$3
3538815
650
2 4
$a
Mobile and Network Security.
$3
3382377
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advances in information security ;
$v
v. 103.
$3
3630709
856
4 0
$u
https://doi.org/10.1007/978-3-031-26845-8
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9453267
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入