Skip to content
You are not logged in |Login  

LEADER 00000cam a2200709Ii 4500 
001    on1078998071 
003    OCoLC 
005    20210410013012.8 
006    m     o  d         
007    cr cnu---unuuu 
008    181215s2018    dk a    ob    001 0 eng d 
019    1078935721 
020    8770220212 
020    9788770220217|q(electronic book) 
035    (OCoLC)1078998071|z(OCoLC)1078935721 
040    EBLCP|beng|epn|cEBLCP|dMERUC|dN$T|dOCLCF|dYDX|dAJB|dWAU
       |dUKAHL|dOCLCQ|dOCLCO 
043    e-ru--- 
049    RIDW 
050  4 QA76.9.A25 
072  7 COM|x053000|2bisacsh 
082 04 005.8|223 
090    QA76.9.A25 
100 1  Petrenko, Sergei,|0https://id.loc.gov/authorities/names/
       no2019013151|eauthor. 
245 10 Cyber security innovation for the digital economy :|ba 
       case study of the Russian Federation /|cSergei Petrenko. 
264  1 Denmark :|bRiver Publishers,|c[2018] 
300    1 online resource (xxxii, 458 pages) :|billustrations. 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc 
347    text file|2rdaft 
490 1  River Publishers Series in Security and Digital Forensics 
500    3.2.3 Sufficient Condition for the Criteria Fulfillment 
504    Includes bibliographical references and index. 
505 0  Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN 
       SECURITY AND DIGITAL FORENSICS; Copyright Page; Contents; 
       Foreword; Preface; Acknowledgements; List of Figures; List
       of Tables; List of Abbreviations; Introduction; Chapter 1 
       -- Relevance of Cyber Security Innovations; 1.1 Digital 
       Transformation of State and Society; 1.1.1 State Program 
       "Digital Economy"; 1.1.2 Main Information Infrastructure 
       Development Objectives; 1.1.3 Implementation of the Long-
       Term Evolution (LTE) Technology; 1.1.4 IIoT/IoT 
       Technologies Development; 1.2 Typical Cyber Security 
       Threats 
505 8  1.2.1 Possible Scenarios of Cyber-Attack on the 
       Information Infrastructure1.2.2 Threats and Consequences 
       of Wireless LAN IEEE 802.1x Implementation; 1.2.3 Cyber 
       Security Threats of Corporate Digital and IP-ATX (Private 
       Automatic Telephone Exchanges); 1.2.4 Threats and Security
       Profile of the Mobile Operating System OS Sailfish and 
       Tizen; 1.3 Cyber Security Threats Monitoring Necessity; 
       1.3.1 Cyber Security Incidents Factual Account; 1.3.2 Need
       for Joint Initiatives of Society and States; 1.3.3 Capture
       the Flag Competition on Vulnerability Detection 
505 8  1.3.4 Security Operations Center (SOC) Key RoleChapter 2 -
       - MSSP/MDR National Operator Development; 2.1 Ultimate 
       Opportunity of National MSSP/MDR Operators; 2.1.1 
       Relevance of MSSP/MDR Cyber Security Services; 2.1.2 MSSP/
       MDR Best Organization PracticeThe MSSP market dynamics in 
       North Americ; 2.1.3 Sample of MSSP by AT 2.1.4 Sample of 
       MSSP Model by UBIqube; 2.1.5 Feasible Technical Solutions;
       2.2 Possible Ways of Providing Cyber Security Services; 
       2.2.1 Typical MSSR/MDR Services; 2.2.2 IS Sourcing Model 
       Analysis; 2.2.3 The IS Sourcing Practice 
505 8  2.2.4 Sample SLA Content for the Provision of Cyber 
       Security Services2.2.5 Best Practices for Providing Cyber 
       Security Service; 2.3 Development of National MSSP/MDR 
       Based on Big Data; 2.3.1 Big Data Processing Requirements 
       Analysis; 2.3.2 Best Big Data Processing Practice; 2.3.3 
       MSSP/MDR Subsystem Functionality for Big Data Processing; 
       2.3.4 Sensor Cloud Architecture Advantages; 2.4 New 
       Methods of Cyber Security Knowledge Management; 2.4.1 
       Possible State of the Art; 2.4.2 Cyber Security MDM 
       Principles; 2.4.3 MDM Cyber Security System Example 
505 8  Chapter 3 -- Innovative Methods for Detecting Anomalies3.1
       Justification of a New Method for Detecting Anomalies; 
       3.1.1 Analysis of the Existing Approaches to the TCP/IP 
       Network Abnormal Functioning Detection; 3.1.2 Possible 
       Statement of the Detecting Anomalies' Problem; 3.1.3 
       Definition of New Informative Features; 3.1.4 Detection of
       Anomalies Based on Dimensions; 3.1.5 Investigation of 
       Properties of Invariants of Dimension; 3.2 The Main 
       Provisions of the New Method for Detecting Anomalies; 
       3.2.1 The Main Hypotheses for Detecting Anomalies; 3.2.2 
       Control of Semantic Correctness Criteria 
588 0  Online resource; title from PDF title page (EBSCO, Febrary
       1, 2019). 
588 0  Print version record. 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
650  0 Computer security|0https://id.loc.gov/authorities/subjects
       /sh90001862|zRussia (Federation)|0https://id.loc.gov/
       authorities/names/n92056007-781|vCase studies.|0https://
       id.loc.gov/authorities/subjects/sh99001484 
650  0 Electronic commerce|0https://id.loc.gov/authorities/
       subjects/sh96008434|xData processing|0https://id.loc.gov/
       authorities/subjects/sh99005487|xSecurity measures|0https:
       //id.loc.gov/authorities/subjects/sh99005297|zRussia 
       (Federation)|0https://id.loc.gov/authorities/names/
       n92056007-781|vCase studies.|0https://id.loc.gov/
       authorities/subjects/sh99001484 
650  0 Business enterprises|xTechnological innovations|0https://
       id.loc.gov/authorities/subjects/sh2009117957|xSecurity 
       measures|0https://id.loc.gov/authorities/subjects/
       sh99005297|zRussia (Federation)|0https://id.loc.gov/
       authorities/names/n92056007-781|vCase studies.|0https://
       id.loc.gov/authorities/subjects/sh99001484 
650  7 Computer security.|2fast|0https://id.worldcat.org/fast/
       872484 
650  7 Electronic commerce.|2fast|0https://id.worldcat.org/fast/
       906906 
650  7 Security systems.|2fast|0https://id.worldcat.org/fast/
       1110883 
650  7 Business enterprises|xTechnological innovations.|2fast
       |0https://id.worldcat.org/fast/842646 
651  7 Russia (Federation)|2fast|0https://id.worldcat.org/fast/
       1262050 
655  4 Electronic books. 
655  7 Case studies.|2fast|0https://id.worldcat.org/fast/1423765 
655  7 Case studies.|2lcgft|0https://id.loc.gov/authorities/
       genreForms/gf2017026140 
776 08 |iPrint version:|aPetrenko, Sergei.|tCyber Security 
       Innovation for the Digital Economy : A Case Study of the 
       Russian Federation.|dAalborg : River Publishers, ©2018 
830  0 River Publishers series in security and digital forensics.
       |0https://id.loc.gov/authorities/names/no2019075335 
856 40 |uhttps://rider.idm.oclc.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=1982635|zOnline ebook via EBSCO. Access 
       restricted to current Rider University students, faculty, 
       and staff. 
856 42 |3Instructions for reading/downloading the EBSCO version 
       of this ebook|uhttp://guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d20210519|cEBSCO|tEBSCOebooksacademic NEW April 9 4115
       |lridw 
994    92|bRID