Security Incidents & Response Against Cyber Attacks (Record no. 78577)

000 -LEADER
fixed length control field 03674nam a22005535i 4500
001 - CONTROL NUMBER
control field 978-3-030-69174-5
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801220440.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210707s2021 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783030691745
-- 978-3-030-69174-5
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
245 10 - TITLE STATEMENT
Title Security Incidents & Response Against Cyber Attacks
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages VIII, 242 p. 110 illus., 91 illus. in color.
490 1# - SERIES STATEMENT
Series statement EAI/Springer Innovations in Communication and Computing,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- By Failing to Prepare – You are preparing to Fail -- Authentication Methods and Applications -- Design of Blockchain Polynomial Digests to Secure Method Authentication -- Need of Cybersecurity for ERP Systems -- IoT – Architecture Vulnerabilities and Security Measures -- Cybersecurity Advanced Persistent Threat Attacks -- Securing Deep Learning Neural Networks -- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry. Shares cases studies on using ML and AI to predict and preempt cyber attacks; Describes security attacks, trends, and scenarios along with attack vectors for various domains and industry sectors; Includes detail on incident planning, detection methods, containing incidents, and clean up and recovery.
700 1# - AUTHOR 2
Author 2 Bhardwaj, Akashdeep.
700 1# - AUTHOR 2
Author 2 Sapra, Varun.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-030-69174-5
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2021.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Psychology, Industrial.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cybercrime.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Industrial Psychology.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2522-8609
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.