The global cyber-vulnerability report /
Saved in:
Imprint: | Cham : Springer, 2015. |
---|---|
Description: | 1 online resource : illustrations, maps. |
Language: | English |
Series: | Terrorism, security, and computation Terrorism, security, and computation. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11096890 |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | 11096890 | ||
005 | 20170630045615.5 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 151211s2015 sz ab ob 001 0 eng d | ||
003 | ICU | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d YDXCP |d N$T |d IDEBK |d GW5XE |d OCLCF |d COO |d CDX |d OCLCQ |d EBLCP |d KSU |d IAO |d JBG |d IAD |d IAS |d ICN |d SOI |d ILO |d IDB |d VT2 |d Z5A |d LIP | ||
019 | |a 941734159 |a 985038651 |a 990740552 | ||
020 | |a 9783319257600 |q (electronic bk.) | ||
020 | |a 3319257609 |q (electronic bk.) | ||
020 | |a 3319257587 |q (print) | ||
020 | |a 9783319257587 |q (print) | ||
020 | |z 9783319257587 | ||
024 | 7 | |a 10.1007/978-3-319-25760-0 |2 doi | |
035 | |a (OCoLC)932064030 |z (OCoLC)941734159 |z (OCoLC)985038651 |z (OCoLC)990740552 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a SOC |x 004000 |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
049 | |a MAIN | ||
245 | 0 | 4 | |a The global cyber-vulnerability report / |c V.S. Subrahmanian [and others]. |
264 | 1 | |a Cham : |b Springer, |c 2015. | |
300 | |a 1 online resource : |b illustrations, maps. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Terrorism, security, and computation | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Vendor-supplied metadata. | |
505 | 0 | |a Introduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis. | |
520 | |a This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference. | ||
546 | |a English. | ||
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Cyberterrorism. |0 http://id.loc.gov/authorities/subjects/sh00001974 | |
650 | 0 | |a Malware (Computer software) |0 http://id.loc.gov/authorities/subjects/sh2009005103 | |
650 | 7 | |a SOCIAL SCIENCE |x Criminology. |2 bisacsh | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Cyberterrorism. |2 fast |0 (OCoLC)fst00885802 | |
650 | 7 | |a Malware (Computer software) |2 fast |0 (OCoLC)fst01748230 | |
650 | 7 | |a Computer Science. |2 hilcc | |
650 | 7 | |a Engineering & Applied Sciences. |2 hilcc | |
655 | 4 | |a Electronic books. | |
655 | 0 | |a Electronic books. | |
700 | 1 | |a Subrahmanian, V. S., |e author. |0 http://id.loc.gov/authorities/names/n91041505 |1 http://viaf.org/viaf/121959406 | |
700 | 1 | |a Ovelgonne, Michael, |e author. |1 http://viaf.org/viaf/210846498 | |
700 | 1 | |a Dumitras, Tudor, |e author. |1 http://viaf.org/viaf/864159474342427662710 | |
700 | 1 | |a Prakash, B. Aditya, |e author. |1 http://viaf.org/viaf/1533159474359227662933 | |
776 | 0 | 8 | |i Printed edition: |z 9783319257587 |
830 | 0 | |a Terrorism, security, and computation. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-319-25760-0 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i 0b250de0-e9d6-516b-bdd5-669144c6b845 |s d4e523c0-5a2f-5ca7-b98c-28c8a4a6925e |
928 | |t Library of Congress classification |a QA76.9.A25 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-319-25760-0 |z SpringerLink |g ebooks |i 9911152 |