000 04369nam a22003855i 4500
001 278705
003 MX-SnUAN
005 20160429153915.0
007 cr nn 008mamaa
008 150903s2005 xxu| o |||| 0|eng d
020 _a9780387242309
_9978-0-387-24230-9
024 7 _a10.1007/b104908
_2doi
035 _avtls000330035
039 9 _a201509030232
_bVLOAD
_c201405070455
_dVLOAD
_c201401311327
_dstaff
_c201401311151
_dstaff
_y201401291445
_zstaff
_wmsplit0.mrc
_x455
050 4 _aQA75.5-76.95
100 1 _aKumar, Vipin.
_eeditor.
_9302500
245 1 0 _aManaging Cyber Threats :
_bIssues, Approaches, and Challenges /
_cedited by Vipin Kumar, Jaideep Srivastava, Aleksandar Lazarevic.
264 1 _aBoston, MA :
_bSpringer US,
_c2005.
300 _aXVIII, 330 páginas,
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aMassive Computing,
_x0924-6703 ;
_v5
500 _aSpringer eBooks
505 0 _aOverview -- Managing Threats to Web Databases and Cyber Systems -- Intrusion Detection: A Survey -- Data Mining Based Analysis of Computer Attacks -- Learning Rules and Clusters for Anomaly Detection in Network Traffic -- Statistical Causality Analysis of Infosec Alert Data -- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization -- Techniques for Managing Cyber Vulnerabilities and Alerts -- Early Detection of Active Internet Worms -- Sensor Families for Intrusion Detection Infrastructures -- Encapsulation of User’s Intent: A New Proactive Intrusion Assessment Paradigm -- Topological Analysis of Network Attack Vulnerability -- Analyzing Survivable Computation in Critical Infrastructures -- Alert Management Systems: A Quick Introduction -- Cyber Forensics -- Cyber Forensics: Managing, Modeling, and Mining Data for Investigation -- Cyber Forensics: Issues and Approaches.
520 _aModern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats. This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance. Audience This book is intended for members of the computer security research and development community interested in state-of-the-art techniques; personnel in federal organizations tasked with managing cyber threats and information leaks from computer systems; personnel at the military and intelligence agencies tasked with defensive and offensive information warfare; personnel in the commercial sector tasked with detection and prevention of fraud in their systems; and personnel running large-scale data centers, either for their organization or for others, tasked with ensuring the security, integrity, and availability of data.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aSrivastava, Jaideepáginas,
_eeditor.
_9302501
700 1 _aLazarevic, Aleksandar.
_eeditor.
_9302502
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9780387242262
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/b104908
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c278705
_d278705