Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats.
This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats.
This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance.
Audience
This book is intended for members of the computer security research and development community interested in state-of-the-art techniques; personnel in federal organizations tasked with managing cyber threats and information leaks from computer systems; personnel at the military and intelligence agencies tasked with defensive and offensive information warfare; personnel in the commercial sector tasked with detection and prevention of fraud in their systems; and personnel running large-scale data centers, either for their organization or for others, tasked with ensuring the security, integrity, and availability of data.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 5,16 per la spedizione in U.S.A.
Destinazione, tempi e costiEUR 6,86 per la spedizione in U.S.A.
Destinazione, tempi e costiDa: Midtown Scholar Bookstore, Harrisburg, PA, U.S.A.
Hardcover. Condizione: Very Good. No dust jacket as issued. No dust jacket. Very Good hardcover with light shelfwear - NICE! Standard-sized. Codice articolo mon0000105609
Quantità: 1 disponibili
Da: The Yard Sale Store, Narrowsburg, NY, U.S.A.
Hard Cover. Condizione: Good. Shiny and new looking. A fine edition. Good. Just a bit of shelf wear to the covers. Excellent edition to your library. Codice articolo NEWAudio7159019
Quantità: 1 disponibili
Da: Best Price, Torrance, CA, U.S.A.
Condizione: New. SUPER FAST SHIPPING. Codice articolo 9780387242262
Quantità: 2 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Feb2215580171122
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9780387242262_new
Quantità: Più di 20 disponibili
Da: moluna, Greven, Germania
Gebunden. Condizione: New. Provides a good blend of in-depth surveys and details of specific technologies from the academic and industrial world. Many of the approaches have been successfully deployed at many academic, military, and commercial organizationsProvides a go. Codice articolo 458428314
Quantità: Più di 20 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Buch. Condizione: Neu. Neuware - Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats.This book brings together the latest techniques for managing cyber threats, developed by some of the world s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance. Codice articolo 9780387242262
Quantità: 2 disponibili