Muutke küpsiste eelistusi

E-raamat: Cyber Warfare: Building the Scientific Foundation

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 135,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.

Arvustused

This collection of basic research is designed for advanced students and practitioners. As is typical of the Springer series, the information is quite current and advanced. Each chapter is a standalone paper with its own list of references at the end . the book is one to include on your reference shelf. (Brad Reid, Computing Reviews, July 2015)

1 Cyber War Games: Strategic Jostling Among Traditional Adversaries
1(14)
Sanjay Goel
Yuan Hong
2 Alternatives to Cyber Warfare: Deterrence and Assurance
15(22)
Robert J. Elder
Alexander H. Levis
Bahram Yousefi
3 Identifying and Exploiting the Cyber High Ground for Botnets
37(20)
Patrick Sweeney
George Cybenko
4 Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare
57(24)
Ehab Al-Shaer
Mohammad Ashiqur Rahman
5 Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security
81(22)
Christopher Kiekintveld
Viliam Lisy
Radek Pibil
6 Cyber Counterdeception: How to Detect Denial & Deception (D&D)
103(38)
Kristin E. Heckman
Frank J. Stech
7 Automated Adversary Profiling
141(10)
Samuel N. Hamilton
8 Cyber Attribution: An Argumentation-Based Approach
151(22)
Paulo Shakarian
Gerardo I. Simari
Geoffrey Moores
Simon Parsons
9 The Human Factor in Cybersecurity: Robust & Intelligent Defense
173(34)
Julie L. Marble
W. F. Lawless
Ranjeev Mittu
Joseph Coyne
Myriam Abramson
Ciara Sibley
10 CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War
207(14)
Noam Ben-Asher
Cleotilde Gonzalez
11 Active Discovery of Hidden Profiles in Social Networks Using Malware
221(16)
Rami Puzis
Yuval Elovici
12 A Survey of Community Detection Algorithms Based On Analysis-Intent
237(28)
Napoleon C. Paxton
Stephen Russell
Ira S. Moskowitz
Paul Hyden
13 Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks
265(22)
Tudor Dumitras
14 Graph Mining for Cyber Security
287(20)
B. Aditya Prakash
15 Programming Language Theoretic Security in the Real World: A Mirage or the Future?
307
Andrew Ruef
Chris Rohlf