Cybersecurity in Digital Transformation Cybersecurity in Digital Transformation
SpringerBriefs on Cyber Security Systems and Networks

Cybersecurity in Digital Transformation

Scope and Applications

    • USD 39.99
    • USD 39.99

Descripción editorial

This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. 
The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capabilitywhich call for sophisticated cybersecurity protecting digital technologies of digital transformation.
Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide.  Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool. 

GÉNERO
Informática e Internet
PUBLICADO
2020
3 de diciembre
IDIOMA
EN
Inglés
EXTENSIÓN
133
Páginas
EDITORIAL
Springer International Publishing
VENDEDOR
Springer Nature B.V.
TAMAÑO
3.3
MB
Guide to Cybersecurity in Digital Transformation Guide to Cybersecurity in Digital Transformation
2023
Guide to Automotive Connectivity and Cybersecurity Guide to Automotive Connectivity and Cybersecurity
2019
Guide to Computing Fundamentals in Cyber-Physical Systems Guide to Computing Fundamentals in Cyber-Physical Systems
2016
Introduction to Transportation Analysis, Modeling and Simulation Introduction to Transportation Analysis, Modeling and Simulation
2014
Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning
2022
Privacy-Preserving Deep Learning Privacy-Preserving Deep Learning
2021
Design and Cryptanalysis of ZUC Design and Cryptanalysis of ZUC
2021
Location Privacy in Mobile Applications Location Privacy in Mobile Applications
2018
Big Digital Forensic Data Big Digital Forensic Data
2018
Advanced Monitoring in P2P Botnets Advanced Monitoring in P2P Botnets
2018