Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 1
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Springer
    UID:
    b3kat_BV047093696
    Format: 1 Online-Ressource (XIX, 114 p. 22 illus)
    Edition: 1st ed. 2020
    ISBN: 9783030605704
    Series Statement: SpringerBriefs on Cyber Security Systems and Networks
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-60569-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-60571-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Cyberspace ; Technische Sicherheit ; Computersicherheit
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham :Springer International Publishing :
    UID:
    almahu_9948621872302882
    Format: XIX, 114 p. 22 illus. , online resource.
    Edition: 1st ed. 2020.
    ISBN: 9783030605704
    Series Statement: SpringerBriefs on Cyber Security Systems and Networks,
    Content: This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capability which call for sophisticated cybersecurity protecting digital technologies of digital transformation. Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide. Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool. .
    Note: 1.Cybersecurity in Digital Transformation -- 2.Introduction to Cybersecurity -- 3.Threat Intelligence -- 4.Intrusion Detection and Prevention -- 5.Machine Learning and Deep Learning -- 6.Attach Models and Scenarios -- 7.Cybersecurity Ontology -- 8.Cybersecurity Leadership.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783030605698
    Additional Edition: Printed edition: ISBN 9783030605711
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Imprint: Springer
    UID:
    gbv_174379925X
    Format: 1 Online-Ressource(XIX, 114 p. 22 illus.)
    Edition: 1st ed. 2020.
    ISBN: 9783030605704
    Series Statement: SpringerBriefs on Cyber Security Systems and Networks
    Content: 1.Cybersecurity in Digital Transformation -- 2.Introduction to Cybersecurity -- 3.Threat Intelligence -- 4.Intrusion Detection and Prevention -- 5.Machine Learning and Deep Learning -- 6.Attach Models and Scenarios -- 7.Cybersecurity Ontology -- 8.Cybersecurity Leadership.
    Content: This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capability which call for sophisticated cybersecurity protecting digital technologies of digital transformation. Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide. Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool. .
    Additional Edition: ISBN 9783030605698
    Additional Edition: ISBN 9783030605711
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030605698
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030605711
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer International Publishing, | Cham :Springer.
    UID:
    edocfu_BV047093696
    Format: 1 Online-Ressource (XIX, 114 p. 22 illus).
    Edition: 1st ed. 2020
    ISBN: 978-3-030-60570-4
    Series Statement: SpringerBriefs on Cyber Security Systems and Networks
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-60569-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-60571-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Cyberspace ; Technische Sicherheit ; Computersicherheit
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cham :Springer International Publishing, | Cham :Springer.
    UID:
    edoccha_BV047093696
    Format: 1 Online-Ressource (XIX, 114 p. 22 illus).
    Edition: 1st ed. 2020
    ISBN: 978-3-030-60570-4
    Series Statement: SpringerBriefs on Cyber Security Systems and Networks
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-60569-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-60571-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Cyberspace ; Technische Sicherheit ; Computersicherheit
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783030650704?
Did you mean 9783030395704?
Did you mean 9783030056704?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages