MARC details
| 000 -LEADER |
| fixed length control field |
03897nam a22004935i 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
DE-He213 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20231104114227.0 |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr nn 008mamaa |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
151113s2015 gw | s |||| 0|eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9783319251332 |
| Canceled/invalid ISBN |
978-3-319-25133-2 |
| 024 7# - OTHER STANDARD IDENTIFIER |
| Standard number or code |
10.1007/978-3-319-25133-2 |
| Source of number or code |
doi |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
TR-AnTOB |
| Language of cataloging |
eng |
| Transcribing agency |
TR-AnTOB |
| Description conventions |
rda |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
UR |
| Source |
bicssc |
|
| Subject category code |
COM053000 |
| Source |
bisacsh |
|
| Subject category code |
UR |
| Source |
thema |
|
| Subject category code |
UTN |
| Source |
thema005.8 |
| -- |
23 |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
İngilizce |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Heckman, Kristin E. |
| Relator term |
author. |
| Relator code |
aut |
| -- |
http://id.loc.gov/vocabulary/relators/aut |
| 245 10 - TITLE STATEMENT |
| Title |
Cyber Denial, Deception and Counter Deception : |
| Remainder of title |
A Framework for Supporting Active Cyber Defense / |
| Statement of responsibility, etc. |
by Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Cham : |
| Name of producer, publisher, distributor, manufacturer |
Springer International Publishing : |
| -- |
Imprint: Springer, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| Source |
rdacarrier |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| File type |
text file |
| Encoding format |
PDF |
| Source |
rda |
| 490 0# - SERIES STATEMENT |
| Series statement |
Advances in Information Security, |
| International Standard Serial Number |
1568-2633 |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Introduction -- Bridging the Classical D&D and Cyber Security Domains -- Intrusions, Deceptions, and Campaigns -- Cyber D&D Case Studies -- Exercising Cyber-D&D -- Considerations, Adaptation, and Sharing -- Countering Denial & Deception -- Capability Maturity Model -- Cyber-D&D Lifecycle Management -- Looking to the future. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. . |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
|
| Topical term or geographic name entry element |
Data encryption (Computer science). |
|
| Topical term or geographic name entry element |
Systems and Data Security. |
| Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28060 |
|
| Topical term or geographic name entry element |
Cryptology. |
| Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28020 |
|
| Topical term or geographic name entry element |
Information Systems Applications (incl. Internet). |
| Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I18040 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Stech, Frank J. |
| Relator term |
author. |
| Relator code |
aut |
| -- |
http://id.loc.gov/vocabulary/relators/aut |
|
| Personal name |
Thomas, Roshan K. |
| Relator term |
author. |
| Relator code |
aut |
| -- |
http://id.loc.gov/vocabulary/relators/aut |
|
| Personal name |
Schmoker, Ben. |
| Relator term |
author. |
| Relator code |
aut |
| -- |
http://id.loc.gov/vocabulary/relators/aut |
|
| Personal name |
Tsow, Alexander W. |
| Relator term |
author. |
| Relator code |
aut |
| -- |
http://id.loc.gov/vocabulary/relators/aut |
| 710 2# - ADDED ENTRY--CORPORATE NAME |
| Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Springer eBooks |
| Public note |
Online access link to the resource |
| Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-3-319-25133-2">https://doi.org/10.1007/978-3-319-25133-2</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Library of Congress Classification |
| Koha item type |
E-Book |