Managing Cyber Threats (Record no. 56318)

MARC details
000 -LEADER
fixed length control field 04336nam a22004455i 4500
001 - CONTROL NUMBER
control field 978-0-387-24230-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250710083931.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2005 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780387242309
-- 99780387242309
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/b104908
Source of number or code doi
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.7
Edition information 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kumar, Vipin.
Relator term editor.
245 10 - TITLE STATEMENT
Title Managing Cyber Threats
Medium [recurso electrónico] :
Remainder of title Issues, Approaches, and Challenges /
Statement of responsibility, etc. edited by Vipin Kumar, Jaideep Srivastava, Aleksandar Lazarevic.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boston, MA :
Name of producer, publisher, distributor, manufacturer Springer US,
Date of production, publication, distribution, manufacture, or copyright notice 2005.
300 ## - PHYSICAL DESCRIPTION
Extent XVIII, 330 p.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term recurso en línea
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Massive Computing,
International Standard Serial Number 0924-6703 ;
Volume/sequential designation 5
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Overview -- Managing Threats to Web Databases and Cyber Systems -- Intrusion Detection: A Survey -- Data Mining Based Analysis of Computer Attacks -- Learning Rules and Clusters for Anomaly Detection in Network Traffic -- Statistical Causality Analysis of Infosec Alert Data -- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization -- Techniques for Managing Cyber Vulnerabilities and Alerts -- Early Detection of Active Internet Worms -- Sensor Families for Intrusion Detection Infrastructures -- Encapsulation of User's Intent: A New Proactive Intrusion Assessment Paradigm -- Topological Analysis of Network Attack Vulnerability -- Analyzing Survivable Computation in Critical Infrastructures -- Alert Management Systems: A Quick Introduction -- Cyber Forensics -- Cyber Forensics: Managing, Modeling, and Mining Data for Investigation -- Cyber Forensics: Issues and Approaches.
520 ## - SUMMARY, ETC.
Summary, etc. Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats. This book brings together the latest techniques for managing cyber threats, developed by some of the world's leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance. Audience This book is intended for members of the computer security research and development community interested in state-of-the-art techniques; personnel in federal organizations tasked with managing cyber threats and information leaks from computer systems; personnel at the military and intelligence agencies tasked with defensive and offensive information warfare; personnel in the commercial sector tasked with detection and prevention of fraud in their systems; and personnel running large-scale data centers, either for their organization or for others, tasked with ensuring the security, integrity, and availability of data.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SCIENCE.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element INFORMATION SYSTEMS.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SCIENCE.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element INFORMATION SYSTEMS AND COMMUNICATION SERVICE.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element INFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET).
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Srivastava, Jaideep.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lazarevic, Aleksandar.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9780387242262
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Massive Computing,
International Standard Serial Number 0924-6703 ;
Volume/sequential designation 5
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://dx.doi.org/10.1007/b104908">http://dx.doi.org/10.1007/b104908</a>
Public note Ver el texto completo en las instalaciones del CICY
912 ## -
-- ZDB-2-SCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Libros electrónicos
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Total checkouts Full call number Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Libro electrónico CICY CICY Libro electrónico 10.07.2025   005.7 10.07.2025 10.07.2025 Libros electrónicos