MARC details
000 -LEADER |
fixed length control field |
03897nam a22004935i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231104114227.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
151113s2015 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319251332 |
Canceled/invalid ISBN |
978-3-319-25133-2 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-3-319-25133-2 |
Source of number or code |
doi |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
TR-AnTOB |
Language of cataloging |
eng |
Transcribing agency |
TR-AnTOB |
Description conventions |
rda |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
|
Subject category code |
COM053000 |
Source |
bisacsh |
|
Subject category code |
UR |
Source |
thema |
|
Subject category code |
UTN |
Source |
thema005.8 |
-- |
23 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
İngilizce |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Heckman, Kristin E. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT |
Title |
Cyber Denial, Deception and Counter Deception : |
Remainder of title |
A Framework for Supporting Active Cyber Defense / |
Statement of responsibility, etc. |
by Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Cham : |
Name of producer, publisher, distributor, manufacturer |
Springer International Publishing : |
-- |
Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
Encoding format |
PDF |
Source |
rda |
490 0# - SERIES STATEMENT |
Series statement |
Advances in Information Security, |
International Standard Serial Number |
1568-2633 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction -- Bridging the Classical D&D and Cyber Security Domains -- Intrusions, Deceptions, and Campaigns -- Cyber D&D Case Studies -- Exercising Cyber-D&D -- Considerations, Adaptation, and Sharing -- Countering Denial & Deception -- Capability Maturity Model -- Cyber-D&D Lifecycle Management -- Looking to the future. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
|
Topical term or geographic name entry element |
Data encryption (Computer science). |
|
Topical term or geographic name entry element |
Systems and Data Security. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28060 |
|
Topical term or geographic name entry element |
Cryptology. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28020 |
|
Topical term or geographic name entry element |
Information Systems Applications (incl. Internet). |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I18040 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Stech, Frank J. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Thomas, Roshan K. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Schmoker, Ben. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Tsow, Alexander W. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Springer eBooks |
Public note |
Online access link to the resource |
Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-3-319-25133-2">https://doi.org/10.1007/978-3-319-25133-2</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
E-Book |