Muutke küpsiste eelistusi

E-raamat: Nano Age of Digital Immunity Infrastructure Fundamentals and Applications: The Intelligent Cyber Shield for Smart Cities

  • Formaat: 509 pages
  • Ilmumisaeg: 05-Mar-2018
  • Kirjastus: CRC Press
  • Keel: eng
  • ISBN-13: 9781351682879
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 58,49 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 509 pages
  • Ilmumisaeg: 05-Mar-2018
  • Kirjastus: CRC Press
  • Keel: eng
  • ISBN-13: 9781351682879
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Present anti-virus technologies do not have the symmetrical weaponry to defeat massive DDoS attacks on smart cities. Smart cities require a new set of holistic and AI-centric cognitive technology, such as autonomic components that replicate the human immune system, and a smart grid that connects all IoT devices. The book introduces Digital Immunity and covers the human immune system, massive distributed attacks (DDoS) and the future generations cyber attacks, the anatomy and critical success factors of smart city, Digital Immunity and the role of the Smart Grid, how Digital Immunity defends the smart city and annihilates massive malware, and Digital Immunity to combat global cyber terrorism.

Preface xiii
Acknowledgments xix
1 The Rise of the Smart City
1(30)
Overpopulation Misery
1(1)
Historic Smart Cities
2(4)
The Democracy of Technology
6(2)
Disruptive Technology
8(1)
The Rise of Nanotechnology and Artificial Intelligence
9(1)
Back to the Smart City
10(2)
The Need for Operations Research and Urban Informatics
12(1)
The Bumpy Road to the Smart City
13(3)
Shopping for a Smart City Simulator
16(3)
The New Science of Cities: Urban Informatics
19(3)
Reality Drivers of the Smart City
22(2)
Introducing Smart City Value Chain
24(2)
Glossary
26(4)
Bibliography
30(1)
2 Challenges of the Smart City
31(32)
Anatomy of the Challenge
31(2)
The Four Challenges of Smart Cities
33(16)
First: The Human Challenge
33(1)
Smart Cities and Eradication of Poverty
33(2)
Second: The Technological Challenge
35(1)
Smart Cities and Eradication of Cybercrime
36(3)
Internet's Compatibility Iceberg
39(1)
The Aging Antivirus Technologies
39(2)
Cybersecurity, the Technological Divide
41(1)
Digital Immunity: The New Miraculous Paradigm
42(1)
Recipe for Digital Immunity
42(1)
We Call It Digital Immunity
43(2)
Third: The Environmental Challenge
45(2)
Fourth: The Urban Commons Challenge
47(2)
All Cities Are Smart, Not Dumb Cities
49(1)
Vendors Interoperability Challenge
50(1)
The Kurzweil Future Vision
51(1)
The UN Appeal for the Smart City
52(1)
The Himalayas K2 Challenge
53(1)
Quality of Life
53(3)
Urbanization Is a Blessing or Curse
56(1)
Glossary
57(3)
Bibliography
60(1)
Book References
61(2)
3 Critical Success Factors of Smart Cities
63(28)
The Atlantis Story
63(1)
Anatomy of the Smart City
64(1)
Microsoft's Zero-Day Cavity
64(2)
Why Do We Need Critical Success Factors?
66(1)
Criticality and Infrastructure Relationship
66(2)
Criticality of Reinforced Column
67(1)
WTC's Achilles Heel
68(2)
Failure of Imagination
68(2)
Heat Won, Steel Lost
70(1)
What Is Systems Science?
71(1)
Basic Definition of CSF
72(2)
The Power Grid Is City's Holy Grail
74(1)
A Smart City Needs a Digital Cockpit
75(5)
The Generalized Uncertainty Principle
80(1)
The CSF and KPI, the Twin Brothers
81(1)
Smart Cities Are Made of Interdependent Structures
82(4)
Critical Success Factors Value Chain
86(1)
Matching Smart City Critical Issues with Best Solutions
87(1)
Glossary
88(1)
Bibliography
89(2)
4 The Flat Tire of Antivirus Technologies
91(48)
The Sun Goes Down
91(1)
The Hardware Acceleration
92(3)
The Legacy Era
92(3)
Catch Me if You Can
95(1)
Quality of Life in the Smart City
96(1)
AVT Meets the City's Smart Grid
97(1)
The Age of AI and Nano
97(1)
Endpoint Protection Evaluation I
98(2)
More AVT Flat Tire Stories
100(2)
Smart Grids Need Smart Solutions
102(1)
Endpoint Protection Evaluation II
102(2)
Breaches Everywhere
104(2)
Merger & Acquisition Technology
106(1)
Breaching Cases
107(1)
Recommendation
108(2)
AVT Cannot Catch Hackers
110(1)
Hacking Psychological Profiling
111(5)
The Nano Cybercriminal
116(1)
Auditing the Hacker's Mind
117(1)
Digital Immunity: The Holy Grail
117(2)
Theory of Reasoned Action
119(2)
Wrong Crystal Ballers
121(1)
Digital Immunity, the Holy Grail of Cybersecurity
122(1)
AVT Software Is the Hijacker!
123(2)
Final Analysis
125(1)
Glossary
126(9)
Bibliography
135(4)
5 DDoS Malware: The Curse of Virus Rain™
139(28)
Introduction
139(1)
The Virus Rain™
139(5)
Queuing Theory Is Future Visioning
144(1)
DDoS Attack Forecast and Mitigation Mathematical Performance Equations
145(1)
Basic Queuing Theory Formulas
145(1)
M/D/1 Case (Random Arrival, Deterministic Service, and One Server)
145(1)
M/M/1 Case (Random Arrival, Random Service, and One Server)
146(1)
M/M/C Case (Markovian, Random Service, and C Servers)
146(2)
The Famous Little Law
148(1)
Conquest against the DDoS Regime
148(2)
DDoS Codification and Cataloguing
150(1)
The Five Protocols of a DoS Attack
151(1)
DDoS Needs Planning and Knowledge
152(1)
Organized Crime in Cyberspace
152(4)
DDoS Arsenal
156(1)
Hacker and Data Guardians
157(1)
Glossary
158(7)
Bibliography
165(2)
6 The Three Generations of DDoS
167(36)
Kurzweil's Accelerating Intelligence
167(2)
The Three Generations of DDoS
169(1)
Evolution and Generation of DDoS
169(21)
The Law of Accelerating Returns
169(1)
First-Generation Gl DDoS: Internet Vandalism
169(3)
The Second-Generation G2 DDoS
172(1)
The Dawn of G2 DDoS Attacks
173(1)
Smart City Fight against G2 DDoS
174(2)
List of Intelligent Assaults
176(14)
Third-Generation G3 DDoS
190(4)
Getting Ready for the Big Malware Attacks
193(1)
Satellite Terrorism
194(1)
The House of Cards
194(3)
Electromagnetic Pulse Attack
195(2)
Washington Doesn't Understand the Internet
197(1)
The Second-Generation Digital Native
197(2)
Glossary
199(1)
Bibliography
200(3)
7 Software Cyborgs of Tomorrow
203(42)
Shaking Hands with Cybernetics
203(2)
What Is a Soft Cyborg?
205(4)
Description of the Anatomy of the Soft Cyborg: Nanobot
205(2)
The Soft Cyborg: Nanobot, Continued
207(2)
Soft Cyborg Knowledge Engines
209(2)
Soft Cyborg Satellite and Web Communication
211(1)
Components of the Satellite Infrastructures
212(1)
Summary of the Internet/Satellite Transactional Services and Messages
213(1)
Future Cyber Warfare
214(1)
Nanobot Is the Rosetta Stone
214(1)
Nanotechnology in Medicine
215(1)
Scenario of Soft Cyborg Attack on Beirut, Lebanon
216(5)
Glossary
221(23)
Bibliography
244(1)
8 The Amazing Architecture of the Human Immune System
245(34)
Introduction
245(1)
The Anatomy of the Futuristic Human Body
246(1)
Inside the Human Machine
247(1)
The 12 Biological Autonomic Systems
248(13)
1 The Circulatory System
248(1)
2 The Digestive System
249(1)
3 The Endocrine System
250(1)
4 The Immune System
250(2)
Anatomy of the Biological Nanobots
252(1)
5 The Lymphatic System
253(1)
6 The Nervous System
254(2)
7 The Muscular System
256(1)
8 The Reproductive System
257(1)
9 The Skeletal System
258(1)
10 The Respiratory System
258(1)
11 The Urinary System
259(1)
12 The Skin
260(1)
The Vital Organs of Survival
261(1)
The Miraculous Brain
262(3)
Types of Nanobots
265(2)
Uploading the Brain to a Computer
267(3)
The Superintelligent Human
270(1)
The Concept of Singularity
270(4)
1 Technologies to Support Smart Cities and Their Infrastructure
271(1)
2 Technologies That Will Promote Human Superintelligence for Smart City Citizens
272(1)
3 Technologies That Support the Quality of Life of Citizens in Smart Cities
272(2)
Smart City Quality of Life (QOL) Indicators
274(1)
The Magic of Superintelligent Digital Immunity
274(1)
Glossary of Human Anatomy
275(2)
Bibliography
277(2)
9 The Miraculous Anatomy of the Digital Immune System
279(42)
Introduction
279(2)
Smart Cities Are Like the Human Body
281(3)
CEWPS is the Electronic Shield of the Smart City
284(1)
The 3D Nano Attack Scenario
285(2)
Anatomy of CEWPS and Its Intelligent Components
287(1)
Anatomical Composition of Digital Immunity (DI)
287(19)
CEWPS Component 1 The Central Coordination Center (CCC)
287(1)
CEWPS Component 2 The Knowledge Acquisition Component
287(3)
What Is Experience?
290(1)
What Is Knowledge?
290(1)
The Six Stages of a Cybercrime Episode
291(1)
Cybercrime Raw Data Distillation Process
292(2)
CEWPS Component 3 The Reasoning Engine
294(1)
What Is Causality?
294(2)
What Is Prediction?
296(1)
We Can Forecast Weather---Why Can't We Predict Crime?
297(1)
Anatomy of the Causality Reasoning Engine
297(1)
CEWPS Component 4 Reverse Engineering Center
297(2)
CEWPS Component 5 Smart City Critical Infrastructure (SCCI)
299(1)
What Is Criticality?
300(1)
What Is a Critical Infrastructure?
301(2)
CEWPS Component 6 The Smart Vaccine Center (SVC)
303(1)
CEWPS Component 7 The VaKB
304(1)
CEWPS Component 8 The ViKB
304(1)
CEWPS Component 9 CEWPS Smart Nanogrid
305(1)
The Smart Grid Model
306(1)
Connectivity of Critical Systems to City's Smart Nanogrid
306(1)
Anatomy of the Autonomic Adapter
306(2)
The Smart City Is Idealistic Hype
308(2)
CEWPS MD
310(1)
Glossary
310(10)
Bibliography
320(1)
10 Unique Features in Digital Immunity Infrastructure
321(32)
Introduction
321(1)
Symbiotic Relation between Science and Technology
322(1)
Building Blocks of Digital Immunity Infrastructure
322(3)
Technology 1 Human Intelligence (The Thinking Machine)
325(1)
Technology 2 Nanotechnology: SVN
325(1)
Sequence of Battle between Soft Cyborgs and SVN
326(1)
Internet of Nano Things
326(8)
Category 1 The Home Area Nano Network (HANN)
328(2)
Category 2 HealthCare Wearable Nanodevice Network (H2M)
330(1)
Category 3 Machine-to-Machine (M2M)
330(4)
Technology 3 Artificial Intelligence, the Ultra-Intelligent Machine
334(1)
Building the Digital Immunity (DI) Infrastructure
335(1)
Anatomy of Digital Immunity (DI)'s Main Components
336(1)
The Amazing Reality of the Nanobot
336(4)
Glossary
340(11)
Bibliography
351(2)
11 The Ingenious Engineering of the Smart Grid
353(26)
Introduction
353(1)
A Brief History of the Grid
353(1)
It All Started with the Power Grid
354(1)
Anatomy of the Human Grid
355(1)
Smart Design Characteristics of the Human Grids
355(2)
Our New Smart Nanogrids
357(2)
The Grid Magnified Million Times
359(1)
Modern Nano Warfare in a Smart City
359(8)
Scenario 1 Attackers Penetrate the City Grid, but Cannot Reach the Targets
362(1)
Scenario 2 Attackers Penetrate the City Grid and Are Ready to Compromise the Targets
363(3)
Scenario 3 Attackers Are Going After the City's Power Grid
366(1)
Internet of NanoThings (IoNT) Connectivity
367(1)
Scenario 4 Attackers Are Going After the City's Partial Power Grid
368(1)
The IoT Autonomic Adapter
368(3)
Organizational Chart of the Smart Vaccine Nano Army
371(2)
A Real-Time Screen of the CEWPS during an Attack
373(1)
Glossary
374(4)
Reference
378(1)
12 Defense Strategies of Smart Cities: Smart Defense by Smart Offense
379(30)
History of Defense
379(1)
Department of Homeland Risk Lexicon
380(1)
The Need for Numerical Metrics
381(1)
Risk Computation
382(1)
The Rise of the Nano Machine: AI, the Future of Cybersecurity
383(1)
Kurzweil's Singularity as Transcendence
384(2)
AVT, the Achilles of Cybersecurity
386(2)
Postulates of Digital Immunity Infrastructure (DI)
388(1)
The Rationale of Defense by Offense
388(4)
Structure of the Smart Nanogrid
392(1)
Deployment Strategy of Smart City Nano Defense
393(3)
How to Build the Nano Smart Grid
396(1)
Blueprint of the Design of Digital Immunity Infrastructure
396(2)
Why Do We Need a Blueprint for Defense Strategy?
398(1)
Building a Robust Nano Defense for a Smart City
399(1)
Glossary
400(7)
Bibliography
407(2)
13 Cyber Terrorism Launched against Smart Cities
409(34)
Introduction
409(1)
Perspectives of Nano Technology
410(1)
Adding Insult to Injury
411(1)
Anatomy of Cyber Terrorism
412(1)
Cyber Terrorism Attraction to Smart Cities
413(3)
How Do Cyber Terrorists Plan an Attack?
413(1)
How Can We Quantitatively Measure the Success of a Cyberattack?
413(2)
What Is the Planning Cycle for a Cyberattack?
415(1)
The Futuristic Architecture of Nano Digital Immunity
416(2)
Attack Scenario of the Virus Nano Rain™
418(3)
Strategy of Attack
421(1)
Cyber Terrorism Shifting to High Gear
422(2)
How Long Will It Take a City to Become a Smart City?
424(1)
Glossary
425(17)
Bibliography
442(1)
14 Epilogue: Where Are We Headed with the Cyber Nightmare?
443(23)
Which Is the Most Powerful Army in the World?
443(1)
The Best Army's Criteria
444(1)
The Cyber Terrorism Armies, Enlisted in the Hall of Infamy
445(10)
1 The Islamic State of Iraq and Syria (ISIS)
445(3)
2 The Russian Cyber Army (ATP28)
448(1)
3 The Syrian Electronic Army
448(4)
4 The Chinese Cyber Army
452(1)
5 North Korean Cyber Army
453(1)
6 The Iran Cyber Army
453(2)
What Drives a Country to Develop a Cyber Army?
455(1)
The Dream Cyberattacks for the Cyber Armies of the World
456(2)
Crystal-Balling Nano Cyber Terrorism in the Future
458(2)
Factor 1 Miniaturization
458(1)
Factor 2 Malware
459(1)
The New Dawn for Cybersecurity
460(1)
Molecular Warfare to Defend Smart Cities
460(6)
Plan of Attack
461(5)
Glossary 466(12)
Bibliography 478(3)
Appendix 481(2)
Index 483
Dr. Rocky Termanini, CEO of MERIT CyberSecurity Group, is a subject matter expert in IT security and brings 46 years of cross-industry experience at national and international levels. He is the designer of the "Cognitive Early-Warning Predictive System" and "The Smart Vaccine" which replicates the human immune system to protect the critical infrastructures against future cyber wars. Dr. Termanini spent five years in the Middle East working as a security consultant in Saudi Arabia, Bahrain, and the UAE. Professor Termaninis teaching experience spans over 30 years. He taught Information Systems courses at Connecticut State University, Quinnipiac University, University of Bahrain, University College of Bahrain, Abu Dhabi University, and lectured at Zayed University in Dubai.