001432586 000__ 02908cam\a2200529\i\4500 001432586 001__ 1432586 001432586 003__ OCoLC 001432586 005__ 20230309003452.0 001432586 006__ m\\\\\o\\d\\\\\\\\ 001432586 007__ cr\cn\nnnunnun 001432586 008__ 201121s2021\\\\sz\a\\\\ob\\\\000\0\eng\d 001432586 019__ $$a1206371471$$a1311344045$$a1311347796 001432586 020__ $$a9783030615918$$q(electronic bk.) 001432586 020__ $$a303061591X$$q(electronic bk.) 001432586 020__ $$z9783030615901 001432586 020__ $$z3030615901 001432586 0247_ $$a10.1007/978-3-030-61591-8$$2doi 001432586 035__ $$aSP(OCoLC)1223095823 001432586 040__ $$aEBLCP$$beng$$erda$$epn$$cEBLCP$$dEBLCP$$dGW5XE$$dYDX$$dOCLCF$$dOCLCO$$dN$T$$dVLB$$dOCLCQ$$dCOM$$dOCLCO$$dSFB$$dOCLCQ 001432586 049__ $$aISEA 001432586 050_4 $$aTK5105.59$$b.f54 2021eb 001432586 08204 $$a005.8$$223 001432586 1001_ $$aFiedelholtz, Glenn,$$eauthor. 001432586 24514 $$aThe cyber security network guide /$$cFiedelholtz. 001432586 264_1 $$aCham :$$bSpringer,$$c[2021] 001432586 264_4 $$c©2021 001432586 300__ $$a1 online resource (xv, 104 pages :$$billustrations (some color)) 001432586 336__ $$atext$$btxt$$2rdacontent 001432586 337__ $$acomputer$$bc$$2rdamedia 001432586 338__ $$aonline resource$$bcr$$2rdacarrier 001432586 4901_ $$aStudies in systems, decision and control ;$$vvolume 274 001432586 504__ $$aIncludes bibliographical references. 001432586 50500 $$tPre-incident Planning and Analysis --$$tIncident Detection and Characterization --$$tVulnerability/Consequence Analysis --$$tIncident Response and Recovery --$$tCloud architecture --$$tLessons learned. 001432586 506__ $$aAccess limited to authorized users. 001432586 520__ $$aThis book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats. It includes updated processes in response to asymmetric threats, as well as descriptions of the current tools to mitigate cyber threats. Featuring comprehensive computer science material relating to a complete network baseline with the characterization hardware and software configuration, the book also identifies potential emerging cyber threats and the vulnerabilities of the network architecture to provide students with a guide to responding to threats. The book is intended for undergraduate and graduate college students who are unfamiliar with the cyber paradigm and processes in responding to attacks. 001432586 588__ $$aDescription based on print version record. 001432586 650_0 $$aComputer networks$$xSecurity measures. 001432586 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures. 001432586 655_0 $$aElectronic books. 001432586 77608 $$iPrint version:$$aFiedelholtz.$$tCyber Security Network Guide.$$dCham : Springer International Publishing AG, ©2020$$z9783030615901 001432586 830_0 $$aStudies in systems, decision and control ;$$vv. 274. 001432586 852__ $$bebk 001432586 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-61591-8$$zOnline Access$$91397441.1 001432586 909CO $$ooai:library.usi.edu:1432586$$pGLOBAL_SET 001432586 980__ $$aBIB 001432586 980__ $$aEBOOK 001432586 982__ $$aEbook 001432586 983__ $$aOnline 001432586 994__ $$a92$$bISE