Big data technologies for monitoring of computer security : a case study of the Russian Federation /

Saved in:
Bibliographic Details
Author / Creator:Petrenko, Sergei.
Imprint:Cham : Springer, [2018]
Description:1 online resource (xxvii, 249 pages) : illustrations
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11655009
Hidden Bibliographic Details
ISBN:9783319790367
3319790366
9783319790350
3319790358
Digital file characteristics:text file PDF
Notes:Includes bibliographical references.
Online resource; title from PDF title page (EBSCO, viewed May 30, 2018).
Summary:This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.
Other form:Printed edition: 9783319790350
Standard no.:10.1007/978-3-319-79036-7
10.1007/978-3-319-79

MARC

LEADER 00000cam a2200000Ia 4500
001 11655009
005 20210625184136.4
006 m o d
007 cr |n|||||||||
008 180522s2018 sz a ob 000 0 eng d
015 |a GBB8N9096  |2 bnb 
016 7 |a 019170823  |2 Uk 
019 |a 1040615288  |a 1042947318  |a 1047670891  |a 1055357821  |a 1059061137  |a 1059222535  |a 1066614256  |a 1082305479  |a 1088972027  |a 1097124137  |a 1105171651  |a 1110969283 
020 |a 9783319790367  |q (electronic bk.) 
020 |a 3319790366  |q (electronic bk.) 
020 |z 9783319790350 
020 |z 3319790358 
024 7 |a 10.1007/978-3-319-79036-7  |2 doi 
024 8 |a 10.1007/978-3-319-79 
035 |a (OCoLC)1036752614  |z (OCoLC)1040615288  |z (OCoLC)1042947318  |z (OCoLC)1047670891  |z (OCoLC)1055357821  |z (OCoLC)1059061137  |z (OCoLC)1059222535  |z (OCoLC)1066614256  |z (OCoLC)1082305479  |z (OCoLC)1088972027  |z (OCoLC)1097124137  |z (OCoLC)1105171651  |z (OCoLC)1110969283 
035 9 |a (OCLCCM-CC)1036752614 
037 |a com.springer.onix.9783319790367  |b Springer Nature 
040 |a YDX  |b eng  |e pn  |c YDX  |d GW5XE  |d N$T  |d AZU  |d COO  |d UAB  |d OCLCF  |d UPM  |d MERER  |d VT2  |d OCLCQ  |d WAU  |d U3W  |d CNCEN  |d WYU  |d OCLCQ  |d LVT  |d DKU  |d UKMGB  |d CAUOI  |d BRX  |d CEF  |d UKAHL  |d AU@  |d LQU  |d OCLCQ 
049 |a MAIN 
050 4 |a TK5105.59 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
100 1 |a Petrenko, Sergei. 
245 1 0 |a Big data technologies for monitoring of computer security :  |b a case study of the Russian Federation /  |c Sergei Petrenko. 
260 |a Cham :  |b Springer,  |c [2018] 
300 |a 1 online resource (xxvii, 249 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed May 30, 2018). 
504 |a Includes bibliographical references. 
505 0 |a 1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion. 
520 |a This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses. 
650 0 |a Intrusion detection systems (Computer security)  |v Case studies. 
650 0 |a Big data  |v Case studies. 
650 0 |a Computer security  |v Case studies. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Business mathematics & systems.  |2 bicssc 
650 7 |a International relations.  |2 bicssc 
650 7 |a Big data.  |2 fast  |0 (OCoLC)fst01892965 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Intrusion detection systems (Computer security)  |2 fast  |0 (OCoLC)fst01762593 
655 4 |a Electronic books. 
655 7 |a Case studies.  |2 fast  |0 (OCoLC)fst01423765 
776 0 8 |i Printed edition:  |z 9783319790350 
903 |a HeVa 
929 |a oclccm 
999 f f |i 553e435e-d763-5863-9612-a7b9bb1bc0ea  |s b028717a-d68a-5410-aaa8-1d6639d02e73 
928 |t Library of Congress classification  |a TK5105.59  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-319-79036-7  |z Springer Nature  |g ebooks  |i 12554170