MARC details
000 -LEADER |
fixed length control field |
03527nam a2200445 i 4500 |
001 - CONTROL NUMBER |
control field |
20495164 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220209083209.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180514s2018 sz a b 000 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2018944334 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319926230 |
Qualifying information |
hardback |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
Modifying agency |
EG-CaTKH |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 PA.G 2018 |
Edition number |
23 |
245 00 - TITLE STATEMENT |
Title |
Guide to vulnerability analysis for computer networks and systems : |
Remainder of title |
an artifical intelligence approach / |
Statement of responsibility, etc. |
Simon Parkinson, Andrew Crampton, Richard Hill, editors. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Cham, Switzerland : |
Name of producer, publisher, distributor, manufacturer |
Springer Berlin Heidelberg, |
Date of production, publication, distribution, manufacture, or copyright notice |
2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
x, 384 pages : |
Other physical details |
illustrations (some colour) ; |
Dimensions |
25 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Computer communications and networks, |
International Standard Serial Number |
1617-7975 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part I: Introduction and State of the Art -- Review of the State of the Art of Vulnerability Assessment Using Artificial Intelligence -- A Survey of Machine Learning Algorithms and Their Application in Information Security -- Part II: Vulnerability Assessment Frameworks -- Vulnerability Assessment of Cybersecurity for SCADA Systems -- A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection -- AI and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection -- Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications -- Part III: Applications of Artificial Intelligence -- Automated Planning of Administrative Tasks Using Historic Events: a File System Case Study -- Defending Against Chained Cyber-Attacks by Adversarial Agents -- Vulnerability Detection and Analysis in Adversarial Deep Learning -- SOCIO-LENS: Spotting Unsolicited Callers Through Network Analysis -- Function Call Graphs Versus Machine Learning for Malware Detection -- Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models -- Masquerade Detection on Mobile Devices -- Identifying File Interaction Patterns in Ransomware Behaviour -- Part IV: Visualisation -- A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN -- Big Data and Cyber Security: A Visual Analytics Perspective. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligence mechanisms."--Back cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Artificial intelligence. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Parkinson, Simon, |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Crampton, Andrew, |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Parkinson, Simon, |
Relator term |
editor. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Computer communications and networks, |
International Standard Serial Number |
1617-7975. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
huda.mahmoud |
Cataloging process |
M |
First Date, FD (RLIN) |
2022029 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20220209 |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
1807 |
600 ## - SUBJECT ADDED ENTRY--PERSONAL NAME |
Source of heading or term |
Parkinson, Simon |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
0 |
b |
ibc |
c |
orignew |
d |
2 |
e |
epcn |
f |
20 |
g |
y-gencatlg |