Modelling cyber security: approaches, methodology, strategies
(eBook)

Book Cover
Published:
Amsterdam ; Washington, D.C. : Ios Press, ©2009.
Format:
eBook
ISBN:
9781607505174, 1607505177, 1282600966, 9781282600966, 6612600969, 9786612600968
Physical Desc:
1 online resource (xxiii, 215 pages) : illustrations
Status:
Ebsco (CCU)
Description

Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security.

Copies
Ebsco (CCU)
More Like This
Citations
APA Citation (style guide)

Gori, U. (2009). Modelling cyber security: approaches, methodology, strategies. Amsterdam ; Washington, D.C., Ios Press.

Chicago / Turabian - Author Date Citation (style guide)

Gori, Umberto. 2009. Modelling Cyber Security: Approaches, Methodology, Strategies. Amsterdam ; Washington, D.C., Ios Press.

Chicago / Turabian - Humanities Citation (style guide)

Gori, Umberto, Modelling Cyber Security: Approaches, Methodology, Strategies. Amsterdam ; Washington, D.C., Ios Press, 2009.

MLA Citation (style guide)

Gori, Umberto. Modelling Cyber Security: Approaches, Methodology, Strategies. Amsterdam ; Washington, D.C., Ios Press, 2009.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
More Copies In Prospector
Loading Prospector Copies...
More Details
Language:
English

Notes

Bibliography
Includes bibliographical references and indexes.
Description
Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security.
Language
English.
Staff View
Grouped Work ID:
b8c764f9-9a5a-21ea-77b7-8d6d55e7a48d
Go To GroupedWork

Record Information

Last File Modification TimeApr 05, 2024 09:22:37 PM
Last Grouped Work Modification TimeApr 05, 2024 09:12:39 PM

MARC Record

LEADER05360cam a2200925 a 4500
001ocn591162494
003OCoLC
00520240329122006.0
006m     o  d        
007cr cn|||||||||
008100401s2009    ne a    ob    101 0 eng d
010 |z  2009940564
040 |a IOSPR|b eng|e pn|c IOSPR|d EBLCP|d YDXCP|d N$T|d IDEBK|d E7B|d OCLCQ|d MHW|d OCLCQ|d FVL|d OCLCQ|d DEBSZ|d OCLCQ|d OCLCO|d OCLCF|d NKT|d OCL|d OCLCO|d OCLCQ|d OCLCO|d AZK|d LOA|d JBG|d AGLDB|d MOR|d PIFAG|d OCLCA|d ZCU|d OCLCQ|d MERUC|d OCLCQ|d U3W|d OCLCA|d STF|d WRM|d VTS|d ICG|d INT|d NRAMU|d VT2|d OCLCQ|d WYU|d OCLCQ|d DKC|d OCLCQ|d M8D|d OCLCQ|d UKCRE|d VLY|d AJS|d OCLCO|d OCLCQ|d OCLCO|d OCLCQ|d OCLCL
019 |a 613666270|a 647899338|a 744953105|a 748598771|a 816387622|a 961486367|a 962559701|a 966206367|a 988433569|a 991919537|a 1037909202|a 1038652178|a 1045529956|a 1066550647|a 1081259156|a 1153454054|a 1162469371|a 1241944116|a 1290092125|a 1300701196
020 |a 9781607505174
020 |a 1607505177
020 |a 1282600966
020 |a 9781282600966
020 |z 1607500744
020 |z 9781607500742
020 |a 6612600969
020 |a 9786612600968
0291 |a AU@|b 000045754125
0291 |a DEBBG|b BV043153130
0291 |a DEBBG|b BV044142846
0291 |a DEBSZ|b 372702473
0291 |a DEBSZ|b 421880465
0291 |a DEBSZ|b 430837542
0291 |a NZ1|b 14242936
035 |a (OCoLC)591162494|z (OCoLC)613666270|z (OCoLC)647899338|z (OCoLC)744953105|z (OCoLC)748598771|z (OCoLC)816387622|z (OCoLC)961486367|z (OCoLC)962559701|z (OCoLC)966206367|z (OCoLC)988433569|z (OCoLC)991919537|z (OCoLC)1037909202|z (OCoLC)1038652178|z (OCoLC)1045529956|z (OCoLC)1066550647|z (OCoLC)1081259156|z (OCoLC)1153454054|z (OCoLC)1162469371|z (OCoLC)1241944116|z (OCoLC)1290092125|z (OCoLC)1300701196
037 |a 978-1-60750-517-4|b IOS Press|n http://www.iospress.nl
050 4|a QA76.9.D314|b M64 2009
072 7|a COM|x SOC000000|2 bisacsh
072 7|a K|2 bicssc
08204|a 004|2 22
049 |a MAIN
1112 |a NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow|d (2009 :|c Venice, Italy)
24510|a Modelling cyber security :|b approaches, methodology, strategies /|c edited by Umberto Gori.
2463 |a Modeling cyber security
260 |a Amsterdam ;|a Washington, D.C. :|b Ios Press,|c ©2009.
300 |a 1 online resource (xxiii, 215 pages) :|b illustrations
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
4901 |a NATO science for peace and security series. E: Human and societal dynamics ;|v v. 59
504 |a Includes bibliographical references and indexes.
5050 |a Title page; Introduction; Contents; Approaching Security; Understanding Terrorism and Its Interaction with Critical Infrastructures; European Measures and Legal Aspects; Curricula Vitae of the Authors; List of Participants. NATO ARW -- Operational Network Intelligence: Today and Tomorrow; Subject Index; Author Index.
520 |a Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security.
5880 |a Print version record.
546 |a English.
650 0|a Computer security|v Congresses.
650 0|a Cryptography|v Congresses.
650 0|a Data encryption (Computer science)|v Congresses.
650 6|a Sécurité informatique|v Congrès.
650 6|a Cryptographie|v Congrès.
650 6|a Chiffrement (Informatique)|v Congrès.
650 7|a COMPUTERS|x Reference.|2 bisacsh
650 7|a COMPUTERS|x Machine Theory.|2 bisacsh
650 7|a COMPUTERS|x Computer Literacy.|2 bisacsh
650 7|a COMPUTERS|x Information Technology.|2 bisacsh
650 7|a COMPUTERS|x Data Processing.|2 bisacsh
650 7|a COMPUTERS|x Computer Science.|2 bisacsh
650 7|a COMPUTERS|x Hardware|x General.|2 bisacsh
650 7|a Computer security|2 fast
650 7|a Cryptography|2 fast
650 7|a Data encryption (Computer science)|2 fast
655 7|a Conference papers and proceedings|2 fast
7001 |a Gori, Umberto.
7102 |a IOS Press.
758 |i has work:|a Modelling cyber security (Text)|1 https://id.oclc.org/worldcat/entity/E39PCGgvttw4364mP99MCM94FX|4 https://id.oclc.org/worldcat/ontology/hasWork
77608|i Print version:|a NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy).|t Modelling cyber security.|d Amsterdam ; Washington, D.C. : Ios Press, ©2009|z 9781607500742|z 1607500744|w (DLC) 2009940564|w (OCoLC)489009775
830 0|a NATO science for peace and security series.|n E,|p Human and societal dynamics ;|v v. 59.
85640|u http://ezproxy.ccu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=315825
938 |a EBL - Ebook Library|b EBLB|n EBL501456
938 |a ebrary|b EBRY|n ebr10375700
938 |a EBSCOhost|b EBSC|n 315825
938 |a ProQuest MyiLibrary Digital eBook Collection|b IDEB|n 260096
938 |a YBP Library Services|b YANK|n 3206142
94901|h 9|l cceb|s j|t 188|w EBSCO Academic : External
994 |a 92|b FCX