|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
11085196 |
005 |
20170630045219.6 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
140521s2014 sz ob 000 0 eng d |
003 |
ICU |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d UKMGB
|d GW5XE
|d COO
|d OCLCO
|d CDX
|d OCLCF
|d E7B
|d B24X7
|d STF
|d VT2
|d YDXCP
|d IDEBK
|d EBLCP
|d OCLCQ
|d OCLCO
|d DIBIB
|d OCLCO
|d JG0
|d Z5A
|d LIP
|
016 |
7 |
|
|a 016724566
|2 Uk
|
019 |
|
|
|a 985052294
|a 990755825
|
020 |
|
|
|a 9783319044477
|q (electronic bk.)
|
020 |
|
|
|a 3319044478
|q (electronic bk.)
|
020 |
|
|
|a 331904446X
|q (print)
|
020 |
|
|
|a 9783319044460
|q (print)
|
020 |
|
|
|z 9783319044460
|
024 |
7 |
|
|a 10.1007/978-3-319-04447-7
|2 doi
|
035 |
|
|
|a (OCoLC)880352771
|z (OCoLC)985052294
|z (OCoLC)990755825
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
049 |
|
|
|a MAIN
|
245 |
0 |
0 |
|a Cyberpatterns :
|b unifying design patterns with security and attack patterns /
|c Clive Blackwell, Hong Zhu, editors.
|
264 |
|
1 |
|a Cham :
|b Springer,
|c 2014.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/c
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/cr
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Online resource; title from PDF title page (Ebsco; viewed on May 21, 2014).
|
520 |
|
|
|a This important new book provides an introduction to and coverage of the state-of-the-art of cyberpatterns, from a theoretical standpoint and via practical applications, bringing together different interdisciplinary areas to portray a holistic view of the underlying principles and mechanisms of cyberpatterns. It includes extended and updated papers from the First International Workshop on Cyberpatterns; provides a broad introduction to this novel and fast-moving field; contains both a research agenda and practical applications for cyberpatterns ; demonstrates the application of patterns to cyber security and other key cyberspace domains; supports the development of a sound scientific, engineering and mathematical foundation for cyberspace. --
|c Edited summary from book.
|
505 |
0 |
|
|a Cyberpatterns: Towards a Pattern Oriented Study of Cyberspace -- Towards a Conceptual Framework for Security Patterns -- Design Patterns: Applications and Open Issues -- Challenges For A Formal Framework for Patterns -- Design Space-Based Pattern Representation -- Extending AOP Principles for the Description of Network Security Patterns -- Management Patterns for Network Resilience: Design and Verification of Policy Configurations -- A Heuristic Approach for Secure Service Composition Adaptation.- A Strategy for Structuring and Formalising Attack Patterns -- Attack Pattern Recognition through Correlating Cyber Situational Awareness in Computer Networks -- Towards a Penetration Testing Framework using Attack Patterns -- On the use of Design Patterns to Capture Memory Corruption Vulnerabilities -- 'Weird Machine' Patterns -- Towards a Simulation of Information Security Behaviour in Organisations -- Security Design Patterns in the MASTER Workbench -- Evaluating the Implications of Attack and Security Patterns with Premortems -- An Overview of Artificial Intelligence Based Pattern Matching in a Security and Digital Forensic Context -- Partitional Clustering of Malware using K-Means -- Dynamic Monitoring of Composed Services -- Where has this hard disk been? : Extracting geospatial intelligence from digital storage systems -- Future Directions for Research on Cyberpatterns.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh94001277
|
650 |
|
0 |
|a Internet
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh2008104644
|
650 |
|
0 |
|a Pattern recognition systems.
|0 http://id.loc.gov/authorities/subjects/sh85098791
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
650 |
|
7 |
|a Pattern recognition systems.
|2 fast
|0 (OCoLC)fst01055266
|
650 |
|
4 |
|a Computer Communication Networks.
|
650 |
|
4 |
|a Computer science.
|
650 |
|
4 |
|a Data protection.
|
650 |
|
4 |
|a Optical pattern recognition.
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
655 |
|
4 |
|a Electronic books.
|
655 |
|
7 |
|a Ebook.
|2 local
|
655 |
|
0 |
|a Electronic books.
|
700 |
1 |
|
|a Blackwell, Clive,
|e editor.
|0 http://id.loc.gov/authorities/names/nb2010026884
|1 http://viaf.org/viaf/157374405
|
700 |
1 |
|
|a Zhu, Hong,
|d 1961-
|e editor.
|0 http://id.loc.gov/authorities/names/no2005073904
|1 http://viaf.org/viaf/56348893
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319044460
|
856 |
4 |
0 |
|u http://link.springer.com/10.1007/978-3-319-04447-7
|y SpringerLink
|
903 |
|
|
|a HeVa
|
929 |
|
|
|a eresource
|
999 |
f |
f |
|i 4337d878-9cbc-574f-ae6f-b2bc2e6a854f
|s bceb8fef-f2c9-5b5e-80f6-f0ebce43c52a
|
928 |
|
|
|t Library of Congress classification
|a TK5105.59
|l Online
|c UC-FullText
|u http://link.springer.com/10.1007/978-3-319-04447-7
|z SpringerLink
|g ebooks
|i 9895434
|