000 03778nam a22005895i 4500
001 vtls000560995
003 RU-ToGU
005 20210922090459.0
007 cr nn 008mamaa
008 170213s2015 gw | s |||| 0|eng d
020 _a9783319257600
_9978-3-319-25760-0
024 7 _a10.1007/978-3-319-25760-0
_2doi
035 _ato000560995
040 _aSpringer
_cSpringer
_dRU-ToGU
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aSubrahmanian, V.S.
_eauthor.
_9413054
245 1 4 _aThe Global Cyber-Vulnerability Report
_helectronic resource
_cby V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash.
250 _a1st ed. 2015.
260 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aXII, 296 p. 399 illus., 398 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aTerrorism, Security, and Computation,
_x2197-8778
505 0 _aIntroduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis.
520 _aThis is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored.  Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and  professionals including government and military workers, policy-makers and law-makers  working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
650 0 _aComputer Science.
_9155490
650 0 _aComputer security.
_9348012
650 0 _aArtificial intelligence.
_9274099
650 0 _aSystem safety.
_9304167
650 0 _aStatistics.
_9124796
650 1 4 _aComputer Science.
_9155490
650 2 4 _aSystems and Data Security.
_9303939
650 2 4 _aSecurity Science and Technology.
_9412116
650 2 4 _aStatistics for Social Science, Behavorial Science, Education, Public Policy, and Law.
_9303278
650 2 4 _aInformation Systems Applications (incl. Internet).
_9299051
650 2 4 _aArtificial Intelligence (incl. Robotics).
_9274102
700 1 _aOvelgonne, Michael.
_eauthor.
_9468811
700 1 _aDumitras, Tudor.
_eauthor.
_9468812
700 1 _aPrakash, B. Aditya.
_eauthor.
_9468813
710 2 _aSpringerLink (Online service)
_9143950
773 0 _tSpringer eBooks
830 0 _aTerrorism, Security, and Computation,
_9413059
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-25760-0
912 _aZDB-2-SCS
999 _c416047