The Global Cyber-Vulnerability Report The Global Cyber-Vulnerability Report
Terrorism, Security, and Computation

The Global Cyber-Vulnerability Report

    • USD 84.99
    • USD 84.99

Descripción editorial

This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. 

Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general.

The Global Cyber-Vulnerability Report targets researchers and  professionals including government and military workers, policy-makers and law-makers  working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.

GÉNERO
Informática e Internet
PUBLICADO
2015
9 de diciembre
IDIOMA
EN
Inglés
EXTENSIÓN
308
Páginas
EDITORIAL
Springer International Publishing
VENDEDOR
Springer Nature B.V.
TAMAÑO
15.4
MB
Machine Learning Techniques to Predict Terrorist Attacks Machine Learning Techniques to Predict Terrorist Attacks
2025
The Android Malware Handbook The Android Malware Handbook
2023
Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020
Cyber Deception Cyber Deception
2016
Cyber Warfare Cyber Warfare
2015
Data-driven Generation of Policies Data-driven Generation of Policies
2014
Foreign Information Manipulation and Interference Foreign Information Manipulation and Interference
2025
Machine Learning Techniques to Predict Terrorist Attacks Machine Learning Techniques to Predict Terrorist Attacks
2025
Discovering Hidden Gems in Foreign Languages Discovering Hidden Gems in Foreign Languages
2023
Detecting Trust and Deception in Group Interaction Detecting Trust and Deception in Group Interaction
2021
A Machine Learning Based Model of Boko Haram A Machine Learning Based Model of Boko Haram
2020
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
2017