9783030605698-3030605698-Cybersecurity in Digital Transformation: Scope and Applications (SpringerBriefs on Cyber Security Systems and Networks)

Cybersecurity in Digital Transformation: Scope and Applications (SpringerBriefs on Cyber Security Systems and Networks)

ISBN-13: 9783030605698
ISBN-10: 3030605698
Edition: 1st ed. 2020
Author: Dietmar P.F. Möller
Publication date: 2020
Publisher: Springer
Format: Paperback 136 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783030605698
ISBN-10: 3030605698
Edition: 1st ed. 2020
Author: Dietmar P.F. Möller
Publication date: 2020
Publisher: Springer
Format: Paperback 136 pages

Summary

Cybersecurity in Digital Transformation: Scope and Applications (SpringerBriefs on Cyber Security Systems and Networks) (ISBN-13: 9783030605698 and ISBN-10: 3030605698), written by authors Dietmar P.F. Möller, was published by Springer in 2020. With an overall rating of 4.2 stars, it's a notable title among other books. You can easily purchase or rent Cybersecurity in Digital Transformation: Scope and Applications (SpringerBriefs on Cyber Security Systems and Networks) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. 

The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capability which call for sophisticated cybersecurity protecting digital technologies of digital transformation.

Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide.  Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool. 



Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book