Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Guide to Cybersecurity in Digital Transformation

Best Price (Coupon Required):
Buy Guide to Cybersecurity in Digital Transformation for $58.50 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $64.99 - $64.99
BEST PRICE

Single Product Purchase

$58.50
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$64.99 $64.99

10% OFF
This deals requires coupon
$58.50
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031268458
Condition
New
Product Description

In todays digital transformation environments, a rigorous cybersecurity approach to effective risk management including contingency planning, outlining immediate actions, preparing post-breach responses is central to defending organizations interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks. Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals. Topics and features: Explores cybersecuritys impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networks Provides numerous examples of applications and best practices Considers methods that organizations can use to assess their cybersecurity awareness and/or strategy Describes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate data Addresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacks Discusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity Standard Gathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity. Dietmar P. F. Mller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Geochemistry at the Earths Surface

Geochemistry at the Earths Surface

$84.99
Integraler baulicher Erdbebenschutz IV: Rumlich schwimmende Lagerung und SEISMISCHE-MASSE-ANALOGIE

Integraler baulicher Erdbebenschutz IV: Rumlich schwimmende Lagerung und SEISMISCHE-MASSE-ANALOGIE

$54.99
Programme zur Methode der Finiten Elemente

Programme zur Methode der Finiten Elemente

$49.99
HCI International 2022  Late Breaking Posters

HCI International 2022 Late Breaking Posters

$129.99
Engineering Geology for Society and Territory - Volume 6

Engineering Geology for Society and Territory - Volume 6

$449.99
An Enquiry into the Asian Growth Model

An Enquiry into the Asian Growth Model

$54.99
The Easter Egg Hunt in Louisiana by Laura Baker

The Easter Egg Hunt in Louisiana by Laura Baker

$10.99
Intelligent Adaptation and Personalization Techniques in Computer-Supported Collaborative Learning

Intelligent Adaptation and Personalization Techniques in Computer-Supported Collaborative Learning

$169.99
Praxiswissen Radio

Praxiswissen Radio

$29.99
DGOR

DGOR

$69.99
Quantitative methods in budgeting

Quantitative methods in budgeting

$54.99
Ionospheric Tomography

Ionospheric Tomography

$169.99
Signal Transduction and the Coordination of B Lymphocyte Development and Function II

Signal Transduction and the Coordination of B Lymphocyte Development and Function II

$169.99
Computer Algebra Recipes for Mathematical Physics

Computer Algebra Recipes for Mathematical Physics

$39.99
Targeting the Foreign Direct Investor

Targeting the Foreign Direct Investor

$129.00
Die Unfallstation der 1. chirurgischen Klinik der Universitt Wien

Die Unfallstation der 1. chirurgischen Klinik der Universitt Wien

$54.99
Terror in Global Narrative

Terror in Global Narrative

$119.99
Inspired by Finance

Inspired by Finance

$84.99
Kartelle, Gewerkschaften und Genossenschaften

Kartelle, Gewerkschaften und Genossenschaften

$59.99
African Development and Global Engagements

African Development and Global Engagements

$169.99
Elektronische Archivierungssysteme

Elektronische Archivierungssysteme

$34.99
Reproduction in Transgender and Nonbinary Individuals

Reproduction in Transgender and Nonbinary Individuals

$119.99
Debating Multiculturalism in the Nordic Welfare States

Debating Multiculturalism in the Nordic Welfare States

$54.99
Stone Fox

Stone Fox

$5.21
American Museum of Natural History: Baby Dolphin's First Day

American Museum of Natural History: Baby Dolphin's First Day

$3.71
ffentlichkeit von Unten

ffentlichkeit von Unten

$44.99
Automotive Embedded Systems

Automotive Embedded Systems

$119.00
Energie aus Sonne, Wind und Meer

Energie aus Sonne, Wind und Meer

$44.99
Membrane Defenses Against Attack by Complement and Perforins

Membrane Defenses Against Attack by Complement and Perforins

$84.99
History of Nordic Computing

History of Nordic Computing

$84.99
Die progressiv-dystrophischen Myopathien

Die progressiv-dystrophischen Myopathien

$69.99
Festivalisierung der Stadtpolitik

Festivalisierung der Stadtpolitik

$44.99
Magic Tree House: #37 Dragon of the Red Dawn

Magic Tree House: #37 Dragon of the Red Dawn

$5.21
The Art of Botanical and Bird Illustration

The Art of Botanical and Bird Illustration

$12.09
That's Not What Happened

That's Not What Happened

$8.24
The Hidden Kingdom (Wings of Fire Graphic Novel Series #3) by Tui T. Sutherland

The Hidden Kingdom (Wings of Fire Graphic Novel Series #3) by Tui T. Sutherland

$12.99
Undressed for Success

Undressed for Success

$54.99
Bronchial Asthma

Bronchial Asthma

$129.99
Office Urology

Office Urology

$199.99
Essays in Cuban Intellectual History

Essays in Cuban Intellectual History

$54.99
previous
next