Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing :
    UID:
    almahu_9948621872302882
    Umfang: XIX, 114 p. 22 illus. , online resource.
    Ausgabe: 1st ed. 2020.
    ISBN: 9783030605704
    Serie: SpringerBriefs on Cyber Security Systems and Networks,
    Inhalt: This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capability which call for sophisticated cybersecurity protecting digital technologies of digital transformation. Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide. Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool. .
    Anmerkung: 1.Cybersecurity in Digital Transformation -- 2.Introduction to Cybersecurity -- 3.Threat Intelligence -- 4.Intrusion Detection and Prevention -- 5.Machine Learning and Deep Learning -- 6.Attach Models and Scenarios -- 7.Cybersecurity Ontology -- 8.Cybersecurity Leadership.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783030605698
    Weitere Ausg.: Printed edition: ISBN 9783030605711
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz