001438042 000__ 03619cam\a2200553\a\4500 001438042 001__ 1438042 001438042 003__ OCoLC 001438042 005__ 20230309004245.0 001438042 006__ m\\\\\o\\d\\\\\\\\ 001438042 007__ cr\un\nnnunnun 001438042 008__ 210713s2021\\\\sz\\\\\\o\\\\\001\0\eng\d 001438042 019__ $$a1260346309$$a1266809586 001438042 020__ $$a9783030691745$$q(electronic bk.) 001438042 020__ $$a3030691748$$q(electronic bk.) 001438042 020__ $$z303069173X 001438042 020__ $$z9783030691738 001438042 0247_ $$a10.1007/978-3-030-69174-5$$2doi 001438042 035__ $$aSP(OCoLC)1260132662 001438042 040__ $$aYDX$$beng$$epn$$cYDX$$dGW5XE$$dEBLCP$$dOCLCO$$dOCLCF$$dDCT$$dUKAHL$$dOCLCO$$dOCLCQ$$dOCLCO$$dN$T$$dOCLCQ 001438042 049__ $$aISEA 001438042 050_4 $$aQA76.9.A25 001438042 08204 $$a005.8068$$223 001438042 24500 $$aSecurity incidents & response against cyber attacks /$$cAkashdeep Bhardwaj, Varun Sapra, editors. 001438042 260__ $$aCham :$$bSpringer,$$c2021. 001438042 300__ $$a1 online resource 001438042 336__ $$atext$$btxt$$2rdacontent 001438042 337__ $$acomputer$$bc$$2rdamedia 001438042 338__ $$aonline resource$$bcr$$2rdacarrier 001438042 347__ $$atext file 001438042 347__ $$bPDF 001438042 4901_ $$aEAI/Springer Innovations in Communication and Computing,$$x2522-8595 001438042 500__ $$aIncludes index. 001438042 5050_ $$aIntroduction -- By Failing to Prepare You are preparing to Fail -- Authentication Methods and Applications -- Design of Blockchain Polynomial Digests to Secure Method Authentication -- Need of Cybersecurity for ERP Systems -- IoT Architecture Vulnerabilities and Security Measures -- Cybersecurity Advanced Persistent Threat Attacks -- Securing Deep Learning Neural Networks -- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments -- Conclusion. 001438042 506__ $$aAccess limited to authorized users. 001438042 520__ $$aThis book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry. Shares cases studies on using ML and AI to predict and preempt cyber attacks; Describes security attacks, trends, and scenarios along with attack vectors for various domains and industry sectors; Includes detail on incident planning, detection methods, containing incidents, and clean up and recovery. 001438042 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 27, 2021). 001438042 650_0 $$aComputer security$$xManagement. 001438042 650_6 $$aSécurité informatique$$xGestion. 001438042 655_0 $$aElectronic books. 001438042 7001_ $$aBhardwaj, Akashdeep,$$d1971-$$eeditor. 001438042 7001_ $$aSapra, Varun,$$d1980-$$eeditor. 001438042 77608 $$iPrint version:$$tSecurity incidents & response against cyber attacks.$$dCham : Springer, 2021$$z303069173X$$z9783030691738$$w(OCoLC)1231959301 001438042 830_0 $$aEAI/Springer innovations in communication and computing,$$x2522-8595 001438042 852__ $$bebk 001438042 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-69174-5$$zOnline Access$$91397441.1 001438042 909CO $$ooai:library.usi.edu:1438042$$pGLOBAL_SET 001438042 980__ $$aBIB 001438042 980__ $$aEBOOK 001438042 982__ $$aEbook 001438042 983__ $$aOnline 001438042 994__ $$a92$$bISE