MARC details
000 -LEADER |
fixed length control field |
03213cam a22004695i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20241001162740.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180504s2018 gw |||| o |||| 0|eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319753072 |
041 ## - LANGUAGE CODE |
Language |
English |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
TEC041000 |
Source |
bisacsh |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
TJK |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
TJK |
Source |
thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
621.382 |
Edition number |
23 |
Item number |
LEH |
245 00 - TITLE STATEMENT |
Title |
Cyber Security: Power and Technology / |
Statement of responsibility, etc |
edited by Martti Lehto, Pekka Neittaanmäki. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2018. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
SPRINGER, |
300 ## - PHYSICAL DESCRIPTION |
Extent |
VIII, 288 pages |
Other physical details |
57 illustrations, 38 illustrations in color. |
505 0# - FORMATTED CONTENTS NOTE |
Contents |
I Cyber Power -- 1 Developing Political Response Framework to Cyber Hostilities -- 2 The modern strategies in the cyber warfare -- 3 Cyber Security Strategy Implementation Architecture in a Value System -- 4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force -- 5 Junk information in hybrid warfare - The rhizomatic speed of social media in the spamosphere -- II Cyber in the Service of the Light Side of the Force -- 6 Real-time application-layer DDoS attacks detection in encrypted traffic -- 7 Domain Generation Algorithms (DGA) detection using machine learning methods -- 8 Tailorable Representation of Security Control Catalog on Semantic Wiki -- 9 Password Cracking -- 10 Game Console attacking -- 11 OS Attacks -- 12 Honeypot utilization for network intrusion detection -- 13 Testing framework for intrusion detection systems in encrypted traffic -- 14 Security Challenges of IoT-based Smart Home Appliances. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computers. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Electrical engineering. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Management information systems. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Communications Engineering, Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Management of Computing and Information Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Models and Principles. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Systems and Data Security. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Lehto, Martti, |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Neittaanmäki, Pekka, |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |
490 1# - SERIES STATEMENT |
Series statement |
Intelligent Systems, Control and Automation: Science and Engineering, |
International Standard Serial Number |
2213-8986 ; |
Volume number/sequential designation |
93 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Relator term |
editor. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Print version: |
Title |
Cyber security : power and technology. |
International Standard Book Number |
9783319753065 |
Record control number |
(DLC) 2018933475 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783030091972 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783319753065 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783319753089 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Intelligent Systems, Control and Automation: Science and Engineering, |
Volume number/sequential designation |
93 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
0 |
b |
ibc |
c |
origres |
d |
u |
e |
ncip |
f |
20 |
g |
y-gencatlg |