Managing Cyber Threats: Issues, Approaches, and Challenges

Author:   Vipin Kumar ,  Jaideep Srivastava ,  Aleksandar Lazarevic
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2005
Volume:   5
ISBN:  

9781441937056


Pages:   330
Publication Date:   06 December 2010
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $261.36 Quantity:  
Add to Cart

Share |

Managing Cyber Threats: Issues, Approaches, and Challenges


Add your own review!

Overview

Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats. This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance.

Full Product Details

Author:   Vipin Kumar ,  Jaideep Srivastava ,  Aleksandar Lazarevic
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2005
Volume:   5
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   0.539kg
ISBN:  

9781441937056


ISBN 10:   1441937056
Pages:   330
Publication Date:   06 December 2010
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Overview.- Managing Threats to Web Databases and Cyber Systems.- Intrusion Detection: A Survey.- Data Mining Based Analysis of Computer Attacks.- Learning Rules and Clusters for Anomaly Detection in Network Traffic.- Statistical Causality Analysis of Infosec Alert Data.- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization.- Techniques for Managing Cyber Vulnerabilities and Alerts.- Early Detection of Active Internet Worms.- Sensor Families for Intrusion Detection Infrastructures.- Encapsulation of User’s Intent: A New Proactive Intrusion Assessment Paradigm.- Topological Analysis of Network Attack Vulnerability.- Analyzing Survivable Computation in Critical Infrastructures.- Alert Management Systems: A Quick Introduction.- Cyber Forensics.- Cyber Forensics: Managing, Modeling, and Mining Data for Investigation.- Cyber Forensics: Issues and Approaches.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List