Cyber Security: Analytics, Technology and Automation by Martti LehtoCyber Security: Analytics, Technology and Automation by Martti Lehto

Cyber Security: Analytics, Technology and Automation

EditorMartti Lehto, Pekka Neittaanmäki

Hardcover | June 10, 2015

Pricing and Purchase Info

$209.66 online 
$232.95 list price save 9%
Earn 1,048 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.

The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

Pekka Neittaanmäki is Professor in Scientific Computing and Dean of the Faculty of Information Technology and Head of COMAS (Computing and Mathematical Sciences) Graduate School at the University of Jyväskylä and Adjunct Professor at the University of Houston, USA. His research interests are mathematical and numerical modeling, signal ...
Loading
Title:Cyber Security: Analytics, Technology and AutomationFormat:HardcoverPublished:June 10, 2015Publisher:Springer International PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:331918301X

ISBN - 13:9783319183015

Look for similar items by category:

Reviews

Table of Contents

Part I Cyber World Today.- 1 Phenomenon in the Cyber World.- 2 Cyber World as a Social System.- 3 Citizens in Cyber World - Despatches from the Virtual "Clinic".- 4 Powers and Fundamental Rights in Cyber Security.- Part II: Cyber Security Threats, Legality and Strategy.- 1 Coder, Hacker, Soldier, Spy.- 2 Cyber Warfare.- 3 Deception in the Cyber-World.- 4 Legal Framework of Cyber Security.- 5 Finnish Cyber Security Strategy and Implementation.- Part III Cyber Security Technology.- 1 Clustering-Based Protocol Classification via Dimensionality Reduction.- 2 Timing and Side Channel Attacks.- 3 Knowledge Discovery from Network Logs.- 4 Trusted Computing and DRM.- Part IV Cyber Security and Automation.-1 Cyber Security and Protection of ICS Systems: An Australian Example.- 2 Towards Dependable Automation.- 3 Specialized Honeypots for SCADA Systems.

Editorial Reviews

"This wonderfully documented text explores themechanics and methods of digital security and the steps necessary to ensureprivacy. . For the professional who is mathematically literate, the book is a must-read.The reference sections that follow each chapter rival that of any PhD thesisever written. It is magnificent in its scholarship." (James Van Speybroeck, ComputingReviews, October, 2015)