Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation

This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Petrenko, Sergei (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03741nam a2200517 4500
001 978-3-319-79036-7
003 DE-He213
005 20190704021236.0
007 cr nn 008mamaa
008 180517s2018 gw | s |||| 0|eng d
020 |a 9783319790367  |9 978-3-319-79036-7 
024 7 |a 10.1007/978-3-319-79036-7  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Petrenko, Sergei.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation  |h [electronic resource] /  |c by Sergei Petrenko. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2018. 
300 |a XXVII, 249 p. 93 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a 1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion. 
520 |a This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses. . 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Big data. 
650 0 |a Security, International. 
650 1 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
650 2 4 |a Big Data/Analytics.  |0 http://scigraph.springernature.com/things/product-market-codes/522070 
650 2 4 |a International Security Studies.  |0 http://scigraph.springernature.com/things/product-market-codes/912120 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319790350 
776 0 8 |i Printed edition:  |z 9783319790374 
776 0 8 |i Printed edition:  |z 9783030077112 
856 4 0 |u https://doi.org/10.1007/978-3-319-79036-7  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)