Cyber Security: Power and Technology / (Record no. 43667)

MARC details
000 -LEADER
fixed length control field 03213cam a22004695i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241001162740.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180504s2018 gw |||| o |||| 0|eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319753072
041 ## - LANGUAGE CODE
Language English
072 #7 - SUBJECT CATEGORY CODE
Subject category code TEC041000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJK
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJK
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.382
Edition number 23
Item number LEH
245 00 - TITLE STATEMENT
Title Cyber Security: Power and Technology /
Statement of responsibility, etc edited by Martti Lehto, Pekka Neittaanmäki.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2018.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc SPRINGER,
300 ## - PHYSICAL DESCRIPTION
Extent VIII, 288 pages
Other physical details 57 illustrations, 38 illustrations in color.
505 0# - FORMATTED CONTENTS NOTE
Contents I Cyber Power -- 1 Developing Political Response Framework to Cyber Hostilities -- 2 The modern strategies in the cyber warfare -- 3 Cyber Security Strategy Implementation Architecture in a Value System -- 4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force -- 5 Junk information in hybrid warfare - The rhizomatic speed of social media in the spamosphere -- II Cyber in the Service of the Light Side of the Force -- 6 Real-time application-layer DDoS attacks detection in encrypted traffic -- 7 Domain Generation Algorithms (DGA) detection using machine learning methods -- 8 Tailorable Representation of Security Control Catalog on Semantic Wiki -- 9 Password Cracking -- 10 Game Console attacking -- 11 OS Attacks -- 12 Honeypot utilization for network intrusion detection -- 13 Testing framework for intrusion detection systems in encrypted traffic -- 14 Security Challenges of IoT-based Smart Home Appliances.
520 ## - SUMMARY, ETC.
Summary, etc This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electrical engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management information systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management of Computing and Information Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Models and Principles.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Systems and Data Security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lehto, Martti,
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Neittaanmäki, Pekka,
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
490 1# - SERIES STATEMENT
Series statement Intelligent Systems, Control and Automation: Science and Engineering,
International Standard Serial Number 2213-8986 ;
Volume number/sequential designation 93
700 1# - ADDED ENTRY--PERSONAL NAME
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Relator term editor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Title Cyber security : power and technology.
International Standard Book Number 9783319753065
Record control number (DLC) 2018933475
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030091972
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783319753065
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783319753089
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Intelligent Systems, Control and Automation: Science and Engineering,
Volume number/sequential designation 93
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b ibc
c origres
d u
e ncip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Medicine, Technology & Management 01/10/2024   621.382 LEH 50237 01/10/2024 01/10/2024 General Books