000727442 000__ 03705cam\a2200493Ii\4500 000727442 001__ 727442 000727442 005__ 20230306140920.0 000727442 006__ m\\\\\o\\d\\\\\\\\ 000727442 007__ cr\cn\nnnunnun 000727442 008__ 150603s2015\\\\sz\a\\\\ob\\\\000\0\eng\d 000727442 019__ $$a914433300 000727442 020__ $$a9783319183022$$qelectronic book 000727442 020__ $$a3319183028$$qelectronic book 000727442 020__ $$z9783319183015 000727442 0247_ $$a10.1007/978-3-319-18302-2$$2doi 000727442 035__ $$aSP(OCoLC)ocn910622947 000727442 035__ $$aSP(OCoLC)910622947$$z(OCoLC)914433300 000727442 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dIDEBK$$dYDXCP$$dCOO$$dEBLCP 000727442 049__ $$aISEA 000727442 050_4 $$aQA76.9.A25 000727442 08204 $$a005.8$$223 000727442 24500 $$aCyber security$$h[electronic resource] :$$banalytics, technology and automation /$$cMartti Lehto, Pekka Neittaanmäki, editors. 000727442 264_1 $$aCham :$$bSpringer,$$c[2015] 000727442 300__ $$a1 online resource :$$bcolor illustrations. 000727442 336__ $$atext$$btxt$$2rdacontent 000727442 337__ $$acomputer$$bc$$2rdamedia 000727442 338__ $$aonline resource$$bcr$$2rdacarrier 000727442 4901_ $$aInternational series on intelligent systems, control and automation--science and engineering,$$x2213-8994 ;$$vvolume 78 000727442 504__ $$aIncludes bibliographical references. 000727442 5050_ $$aPart I Cyber World Today -- 1 Phenomenon in the Cyber World -- 2 Cyber World as a Social System -- 3 Citizens in Cyber World ? Despatches from the Virtual "Clinic" -- 4 Powers and Fundamental Rights in Cyber Security -- Part II: Cyber Security Threats, Legality and Strategy -- 1 Coder, Hacker, Soldier, Spy -- 2 Cyber Warfare -- 3 Deception in the Cyber-World -- 4 Legal Framework of Cyber Security -- 5 Finnish Cyber Security Strategy and Implementation -- Part III Cyber Security Technology -- 1 Clustering-Based Protocol Classification via Dimensionality Reduction -- 2 Timing and Side Channel Attacks -- 3 Knowledge Discovery from Network Logs -- 4 Trusted Computing and DRM -- Part IV Cyber Security and Automation -- 1 Cyber Security and Protection of ICS Systems: An Australian Example -- 2 Towards Dependable Automation -- 3 Specialized Honeypots for SCADA Systems. 000727442 506__ $$aAccess limited to authorized users. 000727442 520__ $$aOver the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security. 000727442 588__ $$aOnline resource; title from PDF title page (viewed June 4, 2015). 000727442 650_0 $$aCyber intelligence (Computer security) 000727442 650_0 $$aComputer networks$$xSecurity measures. 000727442 650_0 $$aComputer security. 000727442 7001_ $$aLehto, Martti,$$eeditor. 000727442 7001_ $$aNeittaanmäki, P.$$q(Pekka),$$eeditor. 000727442 77608 $$iPrint version:$$z9783319183015 000727442 830_0 $$aInternational series on intelligent systems. control and automation--science and engineering ;$$vv. 78. 000727442 852__ $$bebk 000727442 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-18302-2$$zOnline Access$$91397441.1 000727442 909CO $$ooai:library.usi.edu:727442$$pGLOBAL_SET 000727442 980__ $$aEBOOK 000727442 980__ $$aBIB 000727442 982__ $$aEbook 000727442 983__ $$aOnline 000727442 994__ $$a92$$bISE