@article{1432586, recid = {1432586}, author = {Fiedelholtz, Glenn,}, title = {The cyber security network guide /}, pages = {1 online resource (xv, 104 pages :}, abstract = {This book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats. It includes updated processes in response to asymmetric threats, as well as descriptions of the current tools to mitigate cyber threats. Featuring comprehensive computer science material relating to a complete network baseline with the characterization hardware and software configuration, the book also identifies potential emerging cyber threats and the vulnerabilities of the network architecture to provide students with a guide to responding to threats. The book is intended for undergraduate and graduate college students who are unfamiliar with the cyber paradigm and processes in responding to attacks.}, url = {http://library.usi.edu/record/1432586}, doi = {https://doi.org/10.1007/978-3-030-61591-8}, }