|
|
|
|
LEADER |
00000nam a22000007 4500 |
001 |
b3208720 |
003 |
CStclU |
005 |
20190201061449.8 |
006 |
m |o d | |
007 |
cr |n||||||||| |
008 |
190201s2018 xx o 000 0 eng d |
020 |
|
|
|a 9788770220217 (electronic bk.)
|
020 |
|
|
|a 8770220212 (electronic bk.)
|
020 |
|
|
|z 8770220220
|
020 |
|
|
|z 9788770220224
|
035 |
|
|
|a (NhCcYBP)ebc5611042
|
040 |
|
|
|a NhCcYBP
|c NhCcYBP
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a PETRENKO, SERGEI.
|
245 |
1 |
0 |
|a CYBER SECURITY INNOVATION FOR THE DIGITAL ECONOMY :
|b a case study of the russian federation.
|
260 |
|
|
|a [S.l.] :
|b RIVER PUBLISHERS,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 volume.)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a River publishers series in security and digital forensics
|
505 |
0 |
0 |
|a Machine generated contents note:
|g 1.
|t Relevance of Cyber Security Innovations --
|g 1.1.
|t Digital Transformation of State and Society --
|g 1.1.1.
|t State Program "Digital Economy" --
|g 1.1.2.
|t Main Information Infrastructure Development Objectives --
|g 1.1.3.
|t Implementation of the Long-Term Evolution (LTE) Technology --
|g 1.1.4.
|t IIoT/IoT Technologies Development --
|g 1.2.
|t Typical Cyber Security Threats --
|g 1.2.1.
|t Possible Scenarios of Cyber-Attack on the Information Infrastructure --
|g 1.2.2.
|t Threats and Consequences of Wireless LAN IEEE 802.1x Implementation --
|g 1.2.3.
|t Cyber Security Threats of Corporate Digital and IP-ATX (Private Automatic Telephone Exchanges) --
|g 1.2.4.
|t Threats and Security Profile of the Mobile Operating System OS Sailfish and Tizen --
|g 1.3.
|t Cyber Security Threats Monitoring Necessity --
|g 1.3.1.
|t Cyber Security Incidents Factual Account --
|g 1.3.2.
|t Need for Joint Initiatives of Society and States --
|g 1.3.3.
|t Capture the Flag Competition on Vulnerability Detection --
|g 1.3.4.
|t Security Operations Center (SOC) Key Role --
|g 2.
|t MSSP/MDR National Operator Development --
|g 2.1.
|t Ultimate Opportunity of National MSSP/MDR Operators --
|g 2.1.1.
|t Relevance of MSSP/MDR Cyber Security Services --
|g 2.1.2.
|t MSSP/MDR Best Organization Practice --
|g 2.1.3.
|t Sample of MSSP by AT&T --
|g 2.1.4.
|t Sample of MSSP Model by UBIqube --
|g 2.1.5.
|t Feasible Technical Solutions --
|g 2.2.
|t Possible Ways of Providing Cyber Security Services --
|g 2.2.1.
|t Typical MSSR/MDR Services --
|g 2.2.2.
|t IS Sourcing Model Analysis --
|g 2.2.3.
|t IS Sourcing Practice --
|g 2.2.4.
|t Sample SLA Content for the Provision of Cyber Security Services --
|g 2.2.5.
|t Best Practices for Providing Cyber Security Service --
|g 2.3.
|t Development of National MSSP/MDR Based on Big Data --
|g 2.3.1.
|t Big Data Processing Requirements Analysis --
|g 2.3.2.
|t Best Big Data Processing Practice --
|g 2.3.3.
|t MSSP/MDR Subsystem Functionality for Big Data Processing --
|g 2.3.4.
|t Sensor Cloud Architecture Advantages --
|g 2.4.
|t New Methods of Cyber Security Knowledge Management --
|g 2.4.1.
|t Possible State of the Art --
|g 2.4.2.
|t Cyber Security MDM Principles --
|g 2.4.3.
|t MDM Cyber Security System Example --
|g 3.
|t Innovative Methods for Detecting Anomalies --
|g 3.1.
|t Justification of a New Method for Detecting Anomalies --
|g 3.1.1.
|t Analysis of the Existing Approaches to the TCP/IP Network Abnormal Functioning Detection --
|g 3.1.2.
|t Possible Statement of the Detecting Anomalies' Problem --
|g 3.1.3.
|t Definition of New Informative Features --
|g 3.1.4.
|t Detection of Anomalies Based on Dimensions --
|g 3.1.5.
|t Investigation of Properties of Invariants of Dimension --
|g 3.2.
|t Main Provisions of the New Method for Detecting Anomalies --
|g 3.2.1.
|t Main Hypotheses for Detecting Anomalies --
|g 3.2.2.
|t Control of Semantic Correctness Criteria --
|g 3.2.3.
|t Sufficient Condition for the Criteria Fulfillment --
|g 3.2.4.
|t Implementation of the New Method of TCP Transport Layer Protocol --
|g 3.3.
|t Startup of Anomaly Detection Based on Dimensions --
|g 3.3.1.
|t Possible Architecture Solutions --
|g 3.3.2.
|t Features of the Transfer and Control Criteria --
|g 3.3.3.
|t Experiment Results --
|g 3.3.4.
|t Trends and Development Prospects --
|g 3.4.
|t New Method of Analytical Verification --
|g 3.4.1.
|t Data Processing Model on the Example of Oracle Solution --
|g 3.4.2.
|t Marked Data Visualization --
|g 3.4.3.
|t Formalization of HTTP and SQL* Net Protocols --
|g 3.4.4.
|t Presentation of the Transport Layer Protocol (TCP) --
|g 3.4.5.
|t Presentation of the Networking Layer IP --
|g 3.4.6.
|t Control of the Platform Semantic Correctness --
|g 3.4.7.
|t Platform Semantic Correctness Control --
|g 3.4.8.
|t Verification of Applied Queries --
|g 3.4.9.
|t TCP Verification --
|g 3.4.10.
|t IP Verification --
|g 4.
|t Development of Cyber Security Technologies --
|g 4.1.
|t Cyber Security R&D Best Practice --
|g 4.1.1.
|t Cyber Security R&D Importance --
|g 4.1.2.
|t Cyber Security Project Management --
|g 4.1.3.
|t New Cyber Security Problems Statement --
|g 4.2.
|t Development of the Cyber Security Requirements in Terms ofGOSTRIEC 61508 --
|g 4.2.1.
|t Analysis of the Cyber Security Requirements --
|g 4.2.2.
|t Need for GOSTRIEC 61508 Development --
|g 4.2.3.
|t Method for Anomaly Detection in the CF CPCS Behavior --
|g 4.3.
|t Creation of New Cyber Security Ontologies --
|g 4.3.1.
|t Analysis of New Requirements of Cyber Security --
|g 4.3.2.
|t Known Cyber Security Ontologies --
|g 4.3.3.
|t Proposed Cyber Security Ontology --
|g 4.3.4.
|t Ontology Structure Example --
|g 4.4.
|t Development of Cyber Security Platforms --
|g 4.4.1.
|t Principles of Designing Special Computing Systems --
|g 4.4.2.
|t Feasible Computing Classifications --
|g 4.4.3.
|t Characteristics of the Known Computing Systems --
|g 4.4.4.
|t Development of the Supercomputer Technologies --
|g 4.5.
|t Security Software Development based on Agile Methodology --
|g 4.5.1.
|t Main Ideas and Principles of the Agile Methodology --
|g 4.5.2.
|t Best Practices of Agile Methodology --
|g 4.5.3.
|t Adapting Agile for Secure Application Development --
|g 4.6.
|t Development of BI-platforms for Cyber Security Predictive Analytics --
|g 4.6.1.
|t BI-security Platform Requirements --
|g 4.6.2.
|t BI Security Platform Startup --
|g 4.6.3.
|t Expected Results.
|
533 |
|
|
|a Electronic reproduction.
|b Ann Arbor, MI
|n Available via World Wide Web.
|
588 |
|
|
|a Description based on print version record.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer security
|z Russia (Federation)
|x Evaluation.
|
710 |
2 |
|
|a ProQuest (Firm)
|
776 |
0 |
8 |
|c Original
|z 8770220220
|z 9788770220224
|
856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/santaclara/detail.action?docID=5611042
|z Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
|t 0
|
907 |
|
|
|a .b32087202
|b 200401
|c 190204
|
998 |
|
|
|a uww
|b
|c m
|d z
|e l
|f eng
|g xx
|h 0
|
917 |
|
|
|a YBP DDA
|
919 |
|
|
|a .ulebk
|b 2017-02-14
|
999 |
f |
f |
|i 1588afab-45a6-518e-ae18-fcd890019e4e
|s 767626b5-9c10-5831-85af-984c26b71482
|t 0
|