pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: CYBER SITUATIONAL AWARENESS
ISSUES AND RESEARCH
By: Sushil Jajodia (Editor), Peng Liu (Editor), Vipin Swarup (Editor)
Format: Hardback

List price: £119.99


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1441901396
ISBN 13: 9781441901392
Publisher: SPRINGER-VERLAG NEW YORK INC.
Pub. date: 28 October, 2009
Edition: 2010 ed.
Series: Advances in Information Security 46
Pages: 252
Description: When it comes to cyber security accidents, cyber situational awareness is knowing what happened and why it happened. This multidisciplinary volume offers the state-of-the-art in this field, covering fundamental challenges and identifying promising solutions.
Synopsis: Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.
Illustrations: 20 Illustrations, black and white; XII, 252 p. 20 illus.
Publication: US
Imprint: Springer-Verlag New York Inc.
Returns: Returnable
Some other items by this author:
ADAPTIVE INTRUSION TOLERANT DATABASE SYSTEMS
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (HB)
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (PB)
ADVANCES IN MULTIMEDIA INFORMATION SYSTEMS (PB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (HB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (PB)
BAYESIAN OPTIMIZATION
COMPUTATIONAL ADVERTISING
COMPUTATIONAL ADVERTISING (HB)
COMPUTER SECURITY - ESORICS 2008 (PB)
COMPUTER SECURITY -- ESORICS 2013 (PB)
CONCEPTUAL MODELING (PB)
CYBER DECEPTION (HB)
CYBER DECEPTION : BUILDING THE SCIENTIFI (PB)
CYBER SITUATIONAL AWARENESS (PB)
CYBER WARFARE (HB)
CYBER WARFARE (PB)
DATA AND APPLICATIONS SECURITY (PB)
DATA AND APPLICATIONS SECURITY AND PRIVACY (PB)
DATA AND APPLICATIONS SECURITY AND PRIVACY XXX (PB)
DATA AND APPLICATIONS SECURITY XIX (PB)
DATABASE SECURITY XII (HB)
DATABASE SECURITY XII (PB)
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY (HB)
GRAPHICAL MODELS FOR SECURITY (PB)
HANDBOOK OF DATABASE SECURITY (HB)
HANDBOOK OF DATABASE SECURITY (PB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (HB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (PB)
INFORMATION HIDING (HB)
INFORMATION HIDING (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (HB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (PB)
INFORMATION SECURITY THEORY AND PRACTICE (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (PB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (HB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (PB)
JOURNAL ON DATA SEMANTICS II (PB)
MALE IDOLS AND BRANDING IN CHINESE LUXURY
MALE IDOLS AND BRANDING IN CHINESE LUXURY (HB)
MOVING TARGET DEFENSE (HB)
MOVING TARGET DEFENSE (PB)
MOVING TARGET DEFENSE II (HB)
MOVING TARGET DEFENSE II (PB)
MULTILEVEL SECURE TRANSACTION PROCESSING (HB)
MULTILEVEL SECURE TRANSACTION PROCESSING (PB)
MULTIMEDIA DATABASE SYSTEMS (HB)
MULTIMEDIA DATABASE SYSTEMS (PB)
NETWORK HARDENING (PB)
NETWORK SECURITY METRICS
NETWORK SECURITY METRICS (HB)
OXIDATION AND NITRENE TRANSFER REACTIONS CATALYZED BY IRON-OLIGOPYRIDINE COMPLEXES
OXIDATION AND NITRENE TRANSFER REACTIONS CATALYZED BY IRON-OLIGOPYRIDINE COMPLEXES (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (PB)
PRIVACY IN LOCATION-BASED APPLICATIONS (PB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (HB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (PB)
QUANTITATIVE TRADING STRATEGIES USING PYTHON
SECURE CLOUD COMPUTING (HB)
SECURE CLOUD COMPUTING (PB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (HB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (HB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (PB)
STUDY OF ELECTRON TRANSPORT IN SEMICONDUCTOR NANODEVICES
TEMPORAL DATABASES (PB)
THEORY AND MODELS FOR CYBER SITUATION AWARENESS (PB)
THIS IS NOT AVAILABLE 048429
THIS IS NOT AVAILABLE 063455
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (HB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (PB)
TRANSFORMING TURNAROUND SCHOOLS IN CHINA
TRANSFORMING TURNAROUND SCHOOLS IN CHINA (HB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (HB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (PB)

TOP SELLERS IN THIS CATEGORY
Practical Packet Analysis, 3e (Paperback)
No Starch Press,US
Our Price : £35.03
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
The Art of Intrusion (Paperback)
John Wiley and Sons Ltd
Our Price : £10.22
more details
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket