//]]>

Cyber Situational Awareness (Record no. 21004)

000 -LEADER
fixed length control field 04049nam a22005535i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310151109.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2010 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781441901408
978-1-4419-0140-8
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
264 #1 -
-- Boston, MA :
-- Springer US,
-- 2010.
912 ## -
-- ZDB-2-SCS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jajodia, Sushil.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Cyber Situational Awareness
Medium [electronic resource] :
Remainder of title Issues and Research /
Statement of responsibility, etc edited by Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang.
300 ## - PHYSICAL DESCRIPTION
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Advances in Information Security,
International Standard Serial Number 1568-2633 ;
Volume number/sequential designation 46
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note I Overview of Cyber Situational Awareness -- Cyber SA: Situational Awareness for Cyber Defense -- Overview of Cyber Situation Awareness -- II The Reasoning and Decision Making Aspects -- RPD-based Hypothesis Reasoning for Cyber Situation Awareness -- Uncertainty and Risk Management in Cyber Situational Awareness -- III Macroscopic Cyber Situational Awareness -- Employing Honeynets For Network Situational Awareness -- Assessing Cybercrime Through the Eyes of the WOMBAT -- IV Enterprise Cyber Situational Awareness -- Topological Vulnerability Analysis -- Cross-Layer Damage Assessment for Cyber Situational Awareness -- V Microscopic Cyber Situational Awareness -- A Declarative Framework for Intrusion Analysis -- Automated Software Vulnerability Analysis -- VI The Machine Learning Aspect -- Machine Learning Methods for High Level Cyber Situation Awareness.
520 ## - SUMMARY, ETC.
Summary, etc Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question can be well answered, is greatly dependent upon the cyber situational awareness capability of enterprises. Cyber Situational Awareness: Issues and Research is an edited volume contributed by worldwide cyber security experts. This book seeks to establish state of the art in cyber situational awareness area to set course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive system, and decision science areas will elaborate on the fundamental challenges facing the research community and identify promising solutions paths. Case studies based on real world examples are provided throughout this book. Cyber Situational Awareness: Issues and Research is designed for a professional audience composed of government workers and practitioners working in the field of cyber security. Advanced-level students and researchers studying computer science will also find this book useful, as secondary text or a reference book.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Computer network architectures.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Data protection.
Topical term or geographic name as entry element Data structures (Computer science).
Topical term or geographic name as entry element Data encryption (Computer science).
Topical term or geographic name as entry element Information systems.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Systems and Data Security.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Data Encryption.
Topical term or geographic name as entry element Information Systems Applications (incl.Internet).
Topical term or geographic name as entry element Data Structures, Cryptology and Information Theory.
Topical term or geographic name as entry element Computer Systems Organization and Communication Networks.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liu, Peng.
Relator term editor.
Personal name Swarup, Vipin.
Relator term editor.
Personal name Wang, Cliff.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781441901392
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4419-0140-8
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-08AUM Main Library2014-04-08 2014-04-08 E-Book   AUM Main Library005.8

Languages: 
English |
العربية