000 03891nam a22005775i 4500
001 978-3-319-75307-2
003 DE-He213
005 20220801220603.0
007 cr nn 008mamaa
008 180504s2018 sz | s |||| 0|eng d
020 _a9783319753072
_9978-3-319-75307-2
024 7 _a10.1007/978-3-319-75307-2
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aCyber Security: Power and Technology
_h[electronic resource] /
_cedited by Martti Lehto, Pekka Neittaanmäki.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aVIII, 288 p. 57 illus., 38 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIntelligent Systems, Control and Automation: Science and Engineering,
_x2213-8994 ;
_v93
505 0 _aI Cyber Power -- 1 Developing Political Response Framework to Cyber Hostilities -- 2 The modern strategies in the cyber warfare -- 3 Cyber Security Strategy Implementation Architecture in a Value System -- 4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force -- 5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere -- II Cyber in the Service of the Light Side of the Force -- 6 Real-time application-layer DDoS attacks detection in encrypted traffic -- 7 Domain Generation Algorithms (DGA) detection using machine learning methods -- 8 Tailorable Representation of Security Control Catalog on Semantic Wiki -- 9 Password Cracking -- 10 Game Console attacking -- 11 OS Attacks -- 12 Honeypot utilization for network intrusion detection -- 13 Testing framework for intrusion detection systems in encrypted traffic -- 14 Security Challenges of IoT-based Smart Home Appliances.
520 _aThis book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aComputer science.
_99832
650 0 _aElectronic data processing—Management.
_931699
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aModels of Computation.
_931806
650 2 4 _aIT Operations.
_931703
700 1 _aLehto, Martti.
_eeditor.
_0(orcid)0000-0002-8122-3155
_1https://orcid.org/0000-0002-8122-3155
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_951166
700 1 _aNeittaanmäki, Pekka.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_951167
710 2 _aSpringerLink (Online service)
_951168
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319753065
776 0 8 _iPrinted edition:
_z9783319753089
776 0 8 _iPrinted edition:
_z9783030091972
830 0 _aIntelligent Systems, Control and Automation: Science and Engineering,
_x2213-8994 ;
_v93
_951169
856 4 0 _uhttps://doi.org/10.1007/978-3-319-75307-2
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78724
_d78724