Situational Awareness in Computer Network Defense

Principles, Methods and Applications

Nonfiction, Computers, Internet, Security, Application Software, Computer Security, General Computing
Cover of the book Situational Awareness in Computer Network Defense by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466604698
Publisher: IGI Global Publication: January 31, 2012
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466604698
Publisher: IGI Global
Publication: January 31, 2012
Imprint: Information Science Reference
Language: English
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT) that are responsible for ensuring availability, integrity, and confidentiality of network services. Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations for situational awareness in computer networks. This book presents situational awareness solutions in Computer Network Defense (CND) currently being researched or deployed. The key objective is to fill a gap that exists in the way CND and security are being approached by formalizing the use of situational awareness in computer network security and defense.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT) that are responsible for ensuring availability, integrity, and confidentiality of network services. Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations for situational awareness in computer networks. This book presents situational awareness solutions in Computer Network Defense (CND) currently being researched or deployed. The key objective is to fill a gap that exists in the way CND and security are being approached by formalizing the use of situational awareness in computer network security and defense.

More books from IGI Global

Cover of the book Cybersecurity Breaches and Issues Surrounding Online Threat Protection by
Cover of the book Patent Law and Intellectual Property in the Medical Field by
Cover of the book Trends and Effects of Technology Advancement in the Knowledge Society by
Cover of the book Qualitative Spatio-Temporal Representation and Reasoning by
Cover of the book Managing Diversity, Innovation, and Infrastructure in Digital Business by
Cover of the book Pre-Service and In-Service Teacher Education by
Cover of the book Six Sigma Improvements for Basel III and Solvency II in Financial Risk Management by
Cover of the book Challenges Associated with Cross-Cultural and At-Risk Student Engagement by
Cover of the book Business Innovation, Development, and Advancement in the Digital Economy by
Cover of the book Communication and Language Analysis in the Corporate World by
Cover of the book Global Trends, Practices, and Challenges in Contemporary Tourism and Hospitality Management by
Cover of the book Renewable and Alternative Energy by
Cover of the book Technical Challenges and Design Issues in Bangla Language Processing by
Cover of the book Overcoming Challenges in Software Engineering Education by
Cover of the book Video Surveillance Techniques and Technologies by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy