Image from Google Jackets

Cyber Security: Power and Technology [electronic resource] /

Contributor(s): Language: ENG Series: Intelligent Systems, Control and Automation: Science and Engineering ; 93Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018Description: VIII, 288 p. 57 illus., 38 illus. in color. | Binding - Card Paper |Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319753072
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 621.382 23
Online resources: In: Springer Nature eBookSummary: This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.
List(s) this item appears in: Springer Nature eBooks
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.

There are no comments on this title.

to post a comment.
Share
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.