The Global Cyber-Vulnerability Report:
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043309559 | ||
003 | DE-604 | ||
005 | 20160506 | ||
007 | cr|uuu---uuuuu | ||
008 | 160125s2015 xx o|||| 00||| eng d | ||
020 | |a 9783319257600 |c Online |9 978-3-319-25760-0 | ||
024 | 7 | |a 10.1007/978-3-319-25760-0 |2 doi | |
035 | |a (OCoLC)934179157 | ||
035 | |a (DE-599)BVBBV043309559 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-634 |a DE-92 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Subrahmanian, V.S. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Global Cyber-Vulnerability Report |c by V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash |
250 | |a 1st ed. 2015 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online Ressource (XII, 296 p. 399 illus., 398 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Terrorism, Security, and Computation |x 2197-8778 | |
650 | 4 | |a Computer security | |
650 | 4 | |a System safety | |
650 | 4 | |a Statistics | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Statistics for Social Science, Behavorial Science, Education, Public Policy, and Law | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Informatik | |
650 | 4 | |a Statistik | |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ovelgonne, Michael |e Sonstige |4 oth | |
700 | 1 | |a Dumitras, Tudor |e Sonstige |4 oth | |
700 | 1 | |a Prakash, B. Aditya |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-25758-7 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-25760-0 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730248&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028730248 | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-860 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-25760-0 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819322799579201536 |
---|---|
adam_text | THE GLOBAL CYBER-VULNERABILITY REPORT
/ SUBRAHMANIAN, V.S.
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
TYPES OF MALWARE AND MALWARE DISTRIBUTION STRATEGIES.-METHODOLOGY AND
MEASUREMENT.-HUMAN BEHAVIOR AND SUSCEPTIBILITY TO CYBER-ATTACKS
COUNTRY BY COUNTRY ANALYSIS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
THE GLOBAL CYBER-VULNERABILITY REPORT
/ SUBRAHMANIAN, V.S.
: 2015
ABSTRACT / INHALTSTEXT
THIS IS THE FIRST BOOK THAT USES CYBER-VULNERABILITY DATA TO EXPLORE
THE VULNERABILITY OF OVER FOUR MILLION MACHINES PER YEAR, COVERING A
TWO-YEAR PERIOD AS REPORTED BY SYMANTEC. ANALYZING MORE THAN 20 BILLION
TELEMETRY REPORTS COMPRISING MALWARE AND BINARY REPUTATION REPORTS, THIS
BOOK QUANTIFIES THE CYBER-VULNERABILITY OF 44 COUNTRIES FOR WHICH AT
LEAST 500 HOSTS WERE MONITORED. CHAPTERS EXPLAIN THE CONTEXT FOR THIS
DATA AND ITS IMPACT, ALONG WITH EXPLAINING HOW THE CYBER-VULNERABILITY
IS CALCULATED. THIS BOOK ALSO CONTAINS A DETAILED SUMMARY OF THE
CYBER-VULNERABILITY OF DOZENS OF NATIONS ACCORDING TO THE PERCENTAGE OF
INFECTED HOSTS AND NUMBER OF INFECTIONS. IT IDENTIFIES RELATIONSHIPS
BETWEEN PIRACY RATES, GDP AND OTHER COUNTRY INDICATORS. THEBOOK
CONTAINS DETAILED INFORMATION ABOUT POTENTIAL CYBER-SECURITY POLICIES
THAT 44 COUNTRIES HAVE ANNOUNCED, AS WELL AS AN ANALYSIS OF GAPS IN
CYBER-SECURITY POLICIES IN GENERAL. THE GLOBAL CYBER-VULNERABILITY
REPORTTARGETS RESEARCHERS AND PROFESSIONALS INCLUDING GOVERNMENT AND
MILITARY WORKERS, POLICY-MAKERS AND LAW-MAKERS WORKING IN
CYBERSECURITY OR THE WEB INTELLIGENCE FIELDS. ADVANCED-LEVEL STUDENTS IN
COMPUTER SCIENCE WILL ALSO FIND THIS REPORT VALUABLE AS A REFERENCE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Subrahmanian, V.S |
author_facet | Subrahmanian, V.S |
author_role | aut |
author_sort | Subrahmanian, V.S |
author_variant | v s vs |
building | Verbundindex |
bvnumber | BV043309559 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)934179157 (DE-599)BVBBV043309559 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-25760-0 |
edition | 1st ed. 2015 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04372nam a2200829zc 4500</leader><controlfield tag="001">BV043309559</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160506 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160125s2015 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319257600</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-25760-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-25760-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)934179157</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043309559</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Subrahmanian, V.S.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Global Cyber-Vulnerability Report</subfield><subfield code="c">by V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XII, 296 p. 399 illus., 398 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Terrorism, Security, and Computation</subfield><subfield code="x">2197-8778</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistics for Social Science, Behavorial Science, Education, Public Policy, and Law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ovelgonne, Michael</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dumitras, Tudor</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prakash, B. Aditya</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-25758-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730248&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028730248</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-25760-0</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043309559 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:33:23Z |
institution | BVB |
isbn | 9783319257600 |
issn | 2197-8778 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028730248 |
oclc_num | 934179157 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-634 DE-92 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-634 DE-92 DE-860 DE-861 DE-739 |
physical | 1 Online Ressource (XII, 296 p. 399 illus., 398 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series2 | Terrorism, Security, and Computation |
spellingShingle | Subrahmanian, V.S The Global Cyber-Vulnerability Report Computer security System safety Statistics Computer Science Systems and Data Security Security Science and Technology Statistics for Social Science, Behavorial Science, Education, Public Policy, and Law Information Systems Applications (incl. Internet) Artificial Intelligence (incl. Robotics) Informatik Statistik Künstliche Intelligenz (DE-588)4033447-8 gnd Datensicherung (DE-588)4011144-1 gnd Informatik (DE-588)4026894-9 gnd |
subject_GND | (DE-588)4033447-8 (DE-588)4011144-1 (DE-588)4026894-9 |
title | The Global Cyber-Vulnerability Report |
title_auth | The Global Cyber-Vulnerability Report |
title_exact_search | The Global Cyber-Vulnerability Report |
title_full | The Global Cyber-Vulnerability Report by V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash |
title_fullStr | The Global Cyber-Vulnerability Report by V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash |
title_full_unstemmed | The Global Cyber-Vulnerability Report by V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash |
title_short | The Global Cyber-Vulnerability Report |
title_sort | the global cyber vulnerability report |
topic | Computer security System safety Statistics Computer Science Systems and Data Security Security Science and Technology Statistics for Social Science, Behavorial Science, Education, Public Policy, and Law Information Systems Applications (incl. Internet) Artificial Intelligence (incl. Robotics) Informatik Statistik Künstliche Intelligenz (DE-588)4033447-8 gnd Datensicherung (DE-588)4011144-1 gnd Informatik (DE-588)4026894-9 gnd |
topic_facet | Computer security System safety Statistics Computer Science Systems and Data Security Security Science and Technology Statistics for Social Science, Behavorial Science, Education, Public Policy, and Law Information Systems Applications (incl. Internet) Artificial Intelligence (incl. Robotics) Informatik Statistik Künstliche Intelligenz Datensicherung |
url | https://doi.org/10.1007/978-3-319-25760-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730248&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT subrahmanianvs theglobalcybervulnerabilityreport AT ovelgonnemichael theglobalcybervulnerabilityreport AT dumitrastudor theglobalcybervulnerabilityreport AT prakashbaditya theglobalcybervulnerabilityreport |