000 04026nam a22005775i 4500
001 978-3-319-79036-7
003 DE-He213
005 20210201191457.0
007 cr nn 008mamaa
008 180517s2018 gw | s |||| 0|eng d
020 _a9783319790367
_9978-3-319-79036-7
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aPetrenko, Sergei.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aBig Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
_h[electronic resource] /
_cby Sergei Petrenko.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXXVII, 249 p. 93 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
500 _aAcceso multiusuario
505 0 _a1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion.
520 _aThis timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses. .
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aComputer security.
650 0 _aData protection.
650 0 _aBig data.
650 0 _aSecurity, International.
650 1 4 _aSystems and Data Security.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28060
650 2 4 _aSecurity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28000
650 2 4 _aBig Data/Analytics.
_0https://scigraph.springernature.com/ontologies/product-market-codes/522070
650 2 4 _aInternational Security Studies.
_0https://scigraph.springernature.com/ontologies/product-market-codes/912120
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319790350
776 0 8 _iPrinted edition:
_z9783319790374
776 0 8 _iPrinted edition:
_z9783030077112
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-79036-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c243909
_d243908