The Global Cyber-Vulnerability Report by V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya Prakash.

This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies...

Full description

Saved in:
Bibliographic Details
Main Authors: Subrahmanian, V.S (Author), Ovelgonne, Michael (Author), Dumitras, Tudor (Author), Prakash, Aditya (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edition:1st ed. 2015.
Series:Terrorism, Security, and Computation,
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3336565
003 MWH
005 20191025221740.0
007 cr nn 008mamaa
008 151209s2015 gw | s |||| 0|eng d
020 |a 9783319257600 
024 7 |a 10.1007/978-3-319-25760-0  |2 doi 
035 |a (DE-He213)978-3-319-25760-0 
050 4 |a E-Book 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
100 1 |a Subrahmanian, V.S.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 4 |a The Global Cyber-Vulnerability Report  |h [electronic resource] /  |c by V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya Prakash. 
250 |a 1st ed. 2015. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015. 
300 |a XII, 296 p. 399 illus., 398 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Terrorism, Security, and Computation,  |x 2197-8778 
490 1 |a Springer eBook Collection 
505 0 |a Introduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis. 
520 |a This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored.  Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and  professionals including government and military workers, policy-makers and law-makers  working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Computer security. 
650 0 |a System safety. 
650 0 |a Statistics . 
650 0 |a Application software. 
650 0 |a Artificial intelligence. 
690 |a Electronic resources (E-books) 
700 1 |a Ovelgonne, Michael.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Dumitras, Tudor.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Prakash, Aditya.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Terrorism, Security, and Computation,  |x 2197-8778 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-319-25760-0  |3 Click to view e-book  |t 0 
907 |a .b33365659  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 4  |i 1 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i22497274  |z 02-26-20 
999 f f |i 53e9ff99-cfc9-5d22-9bfd-8f7e722ac13e  |s b7f07b16-2009-5830-9e7e-7ec7a0c8e022  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File