000 | 04026nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-319-79036-7 | ||
003 | DE-He213 | ||
005 | 20210201191457.0 | ||
007 | cr nn 008mamaa | ||
008 | 180517s2018 gw | s |||| 0|eng d | ||
020 |
_a9783319790367 _9978-3-319-79036-7 |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aPetrenko, Sergei. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aBig Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation _h[electronic resource] / _cby Sergei Petrenko. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXXVII, 249 p. 93 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
500 | _aAcceso multiusuario | ||
505 | 0 | _a1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion. | |
520 | _aThis timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses. . | ||
541 |
_fUABC ; _cTemporal ; _d01/01/2021-12/31/2023. |
||
650 | 0 | _aComputer security. | |
650 | 0 | _aData protection. | |
650 | 0 | _aBig data. | |
650 | 0 | _aSecurity, International. | |
650 | 1 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aSecurity. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28000 |
650 | 2 | 4 |
_aBig Data/Analytics. _0https://scigraph.springernature.com/ontologies/product-market-codes/522070 |
650 | 2 | 4 |
_aInternational Security Studies. _0https://scigraph.springernature.com/ontologies/product-market-codes/912120 |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319790350 |
776 | 0 | 8 |
_iPrinted edition: _z9783319790374 |
776 | 0 | 8 |
_iPrinted edition: _z9783030077112 |
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-79036-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cLIBRO_ELEC | ||
999 |
_c243909 _d243908 |