Managing Cyber Threats : Issues, Approaches, and Challenges

個数:

Managing Cyber Threats : Issues, Approaches, and Challenges

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 330 p.
  • 言語 ENG
  • 商品コード 9781441937056
  • DDC分類 004

Full Description

Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats.

This book brings together the latest techniques for managing cyber threats, developed by some of the world's leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance.

Contents

Overview.- Managing Threats to Web Databases and Cyber Systems.- Intrusion Detection: A Survey.- Data Mining Based Analysis of Computer Attacks.- Learning Rules and Clusters for Anomaly Detection in Network Traffic.- Statistical Causality Analysis of Infosec Alert Data.- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization.- Techniques for Managing Cyber Vulnerabilities and Alerts.- Early Detection of Active Internet Worms.- Sensor Families for Intrusion Detection Infrastructures.- Encapsulation of User's Intent: A New Proactive Intrusion Assessment Paradigm.- Topological Analysis of Network Attack Vulnerability.- Analyzing Survivable Computation in Critical Infrastructures.- Alert Management Systems: A Quick Introduction.- Cyber Forensics.- Cyber Forensics: Managing, Modeling, and Mining Data for Investigation.- Cyber Forensics: Issues and Approaches.

最近チェックした商品