The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.Wall Street Journal. http://online.wsj.com/news/ articles/ SB10001424052970204058404577110541568535300. Accessed 17 Nov ... Accessed 17 Nov 2013 Hopkins N (2012) Hackers have breached top secret MoD systems, cyber-security chief admits. The Guardian. ... Accessed 17 Nov 2013 Manzoor S (2013) Slaves to the algorithm: are stock market math geniuses, or quants, a force for good? Ottawaanbsp;...
|Title||:||Cyber Security: Analytics, Technology and Automation|
|Author||:||Martti Lehto, Pekka Neittaanmäki|
|Publisher||:||Springer - 2015-05-30|