pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: CYBER WARFARE
BUILDING THE SCIENTIFIC FOUNDATION
By: Sushil Jajodia (Editor), Dr. Paulo Shakarian (Editor), V. S. Subrahmanian (Editor)
Format: Paperback

List price: £85.50


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3319360078
ISBN 13: 9783319360072
Publisher: SPRINGER INTERNATIONAL PUBLISHING AG
Pub. date: 6 October, 2016
Edition: Softcover reprint of the original 1st ed. 2015
Series: Advances in Information Security 56
Pages: 321
Synopsis: This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.
Illustrations: 29 Tables, black and white; 49 Illustrations, color; 34 Illustrations,
Publication: Switzerland
Imprint: Springer International Publishing AG
Returns: Returnable
Some other items by this author:
A GENERAL FRAMEWORK FOR REASONING ON INCONSISTENCY (PB)
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (HB)
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (PB)
ADVANCES IN MULTIMEDIA INFORMATION SYSTEMS (PB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (HB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (PB)
ARTIFICIAL INTELLIGENCE TOOLS FOR CYBER ATTRIBUTION (HB)
COMPUTATIONAL ANALYSIS OF TERRORIST GROUPS: LASHKAR-E-TAIBA (HB)
COMPUTATIONAL ANALYSIS OF TERRORIST GROUPS: LASHKAR-E-TAIBA (PB)
COMPUTER SECURITY - ESORICS 2008 (PB)
COMPUTER SECURITY -- ESORICS 2013 (PB)
CONCEPTUAL MODELING (PB)
CYBER DECEPTION (HB)
CYBER DECEPTION : BUILDING THE SCIENTIFI (PB)
CYBER SITUATIONAL AWARENESS (HB)
CYBER SITUATIONAL AWARENESS (PB)
CYBER WARFARE (HB)
DATA AND APPLICATIONS SECURITY AND PRIVACY (PB)
DATA AND APPLICATIONS SECURITY XIX (PB)
DATABASE SECURITY XII (HB)
DATABASE SECURITY XII (PB)
DIFFUSION IN SOCIAL NETWORKS (PB)
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY (HB)
EXPLORING MALICIOUS HACKER COMMUNITIES (HB)
GEOSPATIAL ABDUCTION (HB)
GEOSPATIAL ABDUCTION (PB)
GRAPHICAL MODELS FOR SECURITY (PB)
HANDBOOK OF COMPUTATIONAL APPROACHES TO COUNTERTERRORISM (HB)
HANDBOOK OF COMPUTATIONAL APPROACHES TO COUNTERTERRORISM (PB)
HANDBOOK OF DATABASE SECURITY (HB)
HANDBOOK OF DATABASE SECURITY (PB)
HETEROGENEOUS AGENT SYSTEMS (HB)
HETEROGENEOUS AGENT SYSTEMS (PB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (HB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (PB)
IDENTIFICATION OF PATHOGENIC SOCIAL MEDIA ACCOUNTS
INDIAN MUJAHIDEEN (HB)
INDIAN MUJAHIDEEN (PB)
INFORMATION HIDING (HB)
INFORMATION HIDING (PB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (HB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (PB)
INFORMATION SECURITY THEORY AND PRACTICE (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (PB)
INTRODUCTION TO CYBER-WARFARE (PB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (HB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (PB)
JOURNAL ON DATA SEMANTICS II (PB)
MACHINE LEARNING BASED MODEL OF BOKO HARAM
MACHINE LEARNING BASED MODEL OF BOKO HARAM (HB)
MOVING TARGET DEFENSE (HB)
MOVING TARGET DEFENSE (PB)
MOVING TARGET DEFENSE II (HB)
MOVING TARGET DEFENSE II (PB)
MULTILEVEL SECURE TRANSACTION PROCESSING (HB)
MULTILEVEL SECURE TRANSACTION PROCESSING (PB)
MULTIMEDIA DATABASE SYSTEMS (HB)
MULTIMEDIA DATABASE SYSTEMS (PB)
MULTIMEDIA INFORMATION SYSTEMS (HB)
MULTIMEDIA INFORMATION SYSTEMS (PB)
NETWORK HARDENING (PB)
NETWORK SECURITY METRICS
NETWORK SECURITY METRICS (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (PB)
PRINCIPLES OF MULTIMEDIA DATABASE SYSTEMS (HB)
PRIVACY IN LOCATION-BASED APPLICATIONS (PB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (HB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (PB)
SCALABLE UNCERTAINTY MANAGEMENT (PB)
SCALABLE UNCERTAINTY MANAGEMENT (PB)
SECURE CLOUD COMPUTING (HB)
SECURE CLOUD COMPUTING (PB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (HB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (HB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (PB)
TEMPORAL DATABASES (PB)
THE GLOBAL CYBER-VULNERABILITY REPORT (HB)
THEORY AND MODELS FOR CYBER SITUATION AWARENESS (PB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (HB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (PB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (HB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (PB)

TOP SELLERS IN THIS CATEGORY
The Art of Intrusion (Paperback)
John Wiley and Sons Ltd
Our Price : £10.22
more details
Practical Packet Analysis, 3e (Paperback)
No Starch Press,US
Our Price : £35.03
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket