Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/782
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPetrenko, Sergei. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:00Z-
dc.date.available2020-05-17T08:22:00Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319790367 ;en_US
dc.identifier.isbn9783319790350 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/782-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319790350. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses. . ;en_US
dc.description.statementofresponsibilityby Sergei Petrenko.en_US
dc.description.tableofcontents1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion. ;en_US
dc.format.extentXXVII, 249 p. 93 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319790350.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectBig data. ;en_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subjectBig Data/Analytics. ;en_US
dc.subjectInternational Security Studies. ;en_US
dc.titleBig Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319790350.pdf7.48 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPetrenko, Sergei. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:00Z-
dc.date.available2020-05-17T08:22:00Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319790367 ;en_US
dc.identifier.isbn9783319790350 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/782-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319790350. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses. . ;en_US
dc.description.statementofresponsibilityby Sergei Petrenko.en_US
dc.description.tableofcontents1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion. ;en_US
dc.format.extentXXVII, 249 p. 93 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319790350.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectBig data. ;en_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subjectBig Data/Analytics. ;en_US
dc.subjectInternational Security Studies. ;en_US
dc.titleBig Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319790350.pdf7.48 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPetrenko, Sergei. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:00Z-
dc.date.available2020-05-17T08:22:00Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319790367 ;en_US
dc.identifier.isbn9783319790350 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/782-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319790350. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses. . ;en_US
dc.description.statementofresponsibilityby Sergei Petrenko.en_US
dc.description.tableofcontents1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion. ;en_US
dc.format.extentXXVII, 249 p. 93 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319790350.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectBig data. ;en_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subjectBig Data/Analytics. ;en_US
dc.subjectInternational Security Studies. ;en_US
dc.titleBig Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319790350.pdf7.48 MBAdobe PDFThumbnail
Preview File