Devotes several chapters on network security metrics specifically designed with zero day attacks in mind
Discusses various applications of network security metrics, ranging from network attack graph analytics to performance evaluation for security operation centers.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.








