Skip to main content

The Cyber Security Network Guide

  • Book
  • © 2021

Overview

  • Provides a computer science technical foundational landscape for cyber practitioners
  • Includes standard operating procedures, cyber operational documentation, and tools utilized in the event of a major cyber incident
  • Presents in-depth background information for each step of the analytic process including pre-incident planning and analysis, incident detection and characterization, vulnerability/consequence analysis, and incident response and recovery
  • Standardizes requirements for cyber-physical analysts and response practitioners

Part of the book series: Studies in Systems, Decision and Control (SSDC, volume 274)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (6 chapters)

Keywords

About this book

This book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats. It includes updated processes in response to asymmetric threats, as well as descriptions of the current tools to mitigate cyber threats. 
  
Featuring comprehensive computer science material relating to a complete network baseline with the characterization hardware and software configuration, the book also identifies potential emerging cyber threats and the vulnerabilities of the network architecture to provide students with a guide to responding to threats. 
     
The book is intended for undergraduate and graduate college students who are unfamiliar with the cyber paradigm and processes in responding to attacks. 


Authors and Affiliations

  • UMBC, Hilltop Circle, Baltimore, USA

    Fiedelholtz

Bibliographic Information

Publish with us