Cyber Security: Power and Technology

Author:   Martti Lehto ,  Pekka Neittaanmäki
Publisher:   Springer Nature Switzerland AG
Edition:   Softcover reprint of the original 1st ed. 2018
Volume:   93
ISBN:  

9783030091972


Pages:   288
Publication Date:   03 January 2019
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $316.77 Quantity:  
Add to Cart

Share |

Cyber Security: Power and Technology


Add your own review!

Overview

This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.

Full Product Details

Author:   Martti Lehto ,  Pekka Neittaanmäki
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   Softcover reprint of the original 1st ed. 2018
Volume:   93
Weight:   0.615kg
ISBN:  

9783030091972


ISBN 10:   303009197
Pages:   288
Publication Date:   03 January 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

I Cyber Power.- 1 Developing Political Response Framework to Cyber Hostilities.- 2 The modern strategies in the cyber warfare.- 3 Cyber Security Strategy Implementation Architecture in a Value System.- 4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force.- 5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere.- II Cyber in the Service of the Light Side of the Force.- 6 Real-time application-layer DDoS attacks detection in encrypted traffic.- 7 Domain Generation Algorithms (DGA) detection using machine learning methods.- 8 Tailorable Representation of Security Control Catalog on Semantic Wiki.- 9 Password Cracking.- 10 Game Console attacking.- 11 OS Attacks.- 12 Honeypot utilization for network intrusion detection.- 13 Testing framework for intrusion detection systems in encrypted traffic.- 14 Security Challenges of IoT-based Smart Home Appliances.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List