Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
New Dimensions of Information Warfare (eBook, PDF)
160,49 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
New Dimensions of Information Warfare (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 3.81MB
Andere Kunden interessierten sich auch für
- Blockchains (eBook, PDF)287,83 €
- Blockchain for Cybersecurity in Cyber-Physical Systems (eBook, PDF)160,49 €
- Matthew RyanRansomware Revolution: The Rise of a Prodigious Cyber Threat (eBook, PDF)181,89 €
- Artificial Intelligence for Cybersecurity (eBook, PDF)149,79 €
- Autonomous Intelligent Cyber Defense Agent (AICA) (eBook, PDF)160,49 €
- Eddy WillemsCyberdanger (eBook, PDF)24,60 €
- Cybersecurity Awareness (eBook, PDF)139,09 €
-
-
-
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Erscheinungstermin: 3. Dezember 2020
- Englisch
- ISBN-13: 9783030606183
- Artikelnr.: 62036244
- Verlag: Springer International Publishing
- Erscheinungstermin: 3. Dezember 2020
- Englisch
- ISBN-13: 9783030606183
- Artikelnr.: 62036244
Preface.- Acknowledgements.- Foreword.- Organization.- Book structure.- 1. Information Disorder.- The new social ecosystem.- Threat: disinformation campaign.- Attacks.- Vaccine hesitancy.- Immigration.- Climate change.- Public naivety.- Alleged political scandals.- Countermeasures.- Low-quality information.- Fake-news detection and removal.- Credibility.- Spreading truth.- Datasets.- Malicious actors.- Social bots.- Fake profiles.- Astroturf.- Spammers.- Sock puppets.- Political memes.- New directions.- Part.- Economy.- State-sponsored Cryptocurrency.- Threat: Collapse of the cryptocurrencies.- Attacks and countermeasures.- Hash Functions.- Open Issues.- Scenario 2: Trust in the Computational Power.- Threat: New Technologies.- Scenario 3: Infrastructure.- Attacks and Countermeasures.- Open Issues.- Towards a State-Sponsored Cryptocurrency.- Bitcoin Limitations.- Develop a State-Sponsored Cryptocurrency.- Scenario 1: Stock market forecasts.- Threat: Information-based manipulation.- A large attack surface.- Attacks and countermeasures.- Open issues and future directions.- Threat: Trade-based manipulation.- Attacks.- Countermeasures.- Open issues and future directions.- Threat: Algorithm-based manipulation.- Algorithms taking over.- Loose cannons on the automation deck.- Attacks.- Countermeasures.- Open issues and future directions.- Other countermeasures.- Threat: Technological bias, divide, and monopoly.- Attacks and countermeasures.- Open issues and future directions.- Scenario 3: Remote stock market.- Threat: Attacks against availability.- Attacks and countermeasures.- Threat: Work-from-home perils.- Attacks.- Countermeasures.- Open issues and future directions.- Scenario 4: Complex financial networks.- Threat: Systemic risk and cascading failures.- Measures of systemic risk.- Economics and finance approaches.- Network approaches.- Countermeasures.- Open issues and future directions. Part.- Infrastructure.- Critical Infrastructure.- Scenario: Cyber Warfare targeting Critical Infrastructures.- Threat: Malware.- Attacks and Countermeasures.- Open Issues and Future Directions.- Scenario: A new Cyber-Physical threat from the sky.- Threat: Drones.- Attacks and Countermeasures.- Open Issues and Future Directions.- Attacks and countermeasures.- Open issues and future directions.- Threat: outsourcing of security.- Attacks and countermeasures.- Trust in the cloud.- Security perimeter.- Confidentiality.- Integrity.- Availability.- Open issues and future directions.- Technical side
Preface.- Acknowledgements.- Foreword.- Organization.- Book structure.- 1. Information Disorder.- The new social ecosystem.- Threat: disinformation campaign.- Attacks.- Vaccine hesitancy.- Immigration.- Climate change.- Public naivety.- Alleged political scandals.- Countermeasures.- Low-quality information.- Fake-news detection and removal.- Credibility.- Spreading truth.- Datasets.- Malicious actors.- Social bots.- Fake profiles.- Astroturf.- Spammers.- Sock puppets.- Political memes.- New directions.- Part.- Economy.- State-sponsored Cryptocurrency.- Threat: Collapse of the cryptocurrencies.- Attacks and countermeasures.- Hash Functions.- Open Issues.- Scenario 2: Trust in the Computational Power.- Threat: New Technologies.- Scenario 3: Infrastructure.- Attacks and Countermeasures.- Open Issues.- Towards a State-Sponsored Cryptocurrency.- Bitcoin Limitations.- Develop a State-Sponsored Cryptocurrency.- Scenario 1: Stock market forecasts.- Threat: Information-based manipulation.- A large attack surface.- Attacks and countermeasures.- Open issues and future directions.- Threat: Trade-based manipulation.- Attacks.- Countermeasures.- Open issues and future directions.- Threat: Algorithm-based manipulation.- Algorithms taking over.- Loose cannons on the automation deck.- Attacks.- Countermeasures.- Open issues and future directions.- Other countermeasures.- Threat: Technological bias, divide, and monopoly.- Attacks and countermeasures.- Open issues and future directions.- Scenario 3: Remote stock market.- Threat: Attacks against availability.- Attacks and countermeasures.- Threat: Work-from-home perils.- Attacks.- Countermeasures.- Open issues and future directions.- Scenario 4: Complex financial networks.- Threat: Systemic risk and cascading failures.- Measures of systemic risk.- Economics and finance approaches.- Network approaches.- Countermeasures.- Open issues and future directions. Part.- Infrastructure.- Critical Infrastructure.- Scenario: Cyber Warfare targeting Critical Infrastructures.- Threat: Malware.- Attacks and Countermeasures.- Open Issues and Future Directions.- Scenario: A new Cyber-Physical threat from the sky.- Threat: Drones.- Attacks and Countermeasures.- Open Issues and Future Directions.- Attacks and countermeasures.- Open issues and future directions.- Threat: outsourcing of security.- Attacks and countermeasures.- Trust in the cloud.- Security perimeter.- Confidentiality.- Integrity.- Availability.- Open issues and future directions.- Technical side