72,95 €
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
36 °P sammeln
72,95 €
72,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
36 °P sammeln
Als Download kaufen
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
36 °P sammeln
Jetzt verschenken
72,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
36 °P sammeln
  • Format: PDF

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored.
Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of
…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 13.94MB
Produktbeschreibung
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored.

Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general.

The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Laura Mostert is an officer in the Royal Netherlands Air Force with a background in war studies and cyber security governance. Roy Lindelauf is the Chair Data Science in Military Operations at Faculty of Military Sciences at Netherlands Defence Academy and an Endowed Chair Data Science for Safety, Security at the Department of Cognitive Science & Artificial Intelligence at Tilburg School of Humanities and Digital Sciences. He is also Head of Data Science Center of Excellence at Netherlands Ministry of Defence. Chiara Pulice is a Senior Research Associate in computer science with Northwestern University, Evanston, IL, USA. Her research interests include counter-terrorism and machine learning. She received the Ph.D. degree in computer and systems engineering from the University of Calabria, Cosenza, Italy, in 2015. Marnix Provoost is an active duty officer in the Royal Netherlands Army. He holds a Master’s degree in Military Strategic Studies and is currently positioned at the Netherlands Defence Academy as a fulltime PhD student. His research is focused on insurgencies and their analogies with state formation. Priyanka Amin has recently finished her undergraduate degree in computer science and global history at Northwestern University. V.S. Subrahmanian is the Walter P. Murphy Professor of Computer Science and Buffett Faculty Fellow in the Buffett Institute for Global Affairs at Northwestern University where he also heads the Northwestern Security & AI Lab. He is one of the world’s foremost experts at the intersection of AI and Security matters ranging from counterterrorism to cybersecurity to border issues and warfare. An elected Fellow of AAAI and AAAS, he has previously served as Director of the Institute for Security, Technology, and Society at Dartmouth College and as Director of the University of Maryland Institute for Advanced Computer Studies.