An introduction to cyber modeling and simulation (Record no. 1608)

MARC details
000 -LEADER
fixed length control field 02707nam a2200217 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250714141113.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250714b2019|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119420811
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Couretas, Jerry M.
Relator term Author
245 ## - TITLE STATEMENT
Title An introduction to cyber modeling and simulation
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2019.
300 ## - PHYSICAL DESCRIPTION
Number of Pages x, 177p.
500 ## - GENERAL NOTE
General note Introduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally<br/><br/>This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments, the author presents the overall information assurance process, incorporating the people, policies, processes, and technologies currently available in the field. The author ties up the various threads that currently compose cyber M&S into a coherent view of what is measurable, simulative, and usable in order to evaluate systems for assured operation.<br/><br/>An Introduction to Cyber Modeling and Simulation provides the reader with examples of tools and technologies currently available for performing cyber modeling and simulation. It examines how decision-making processes may benefit from M&S in cyber defense. It also examines example emulators, simulators and their potential combination. The book also takes a look at corresponding verification and validation (V&V) processes, which provide the operational community with confidence in knowing that cyber models represent the real world. This book:<br/><br/>Explores the role of cyber M&S in decision making<br/>Provides a method for contextualizing and understanding cyber risk<br/>Shows how concepts such the Risk Management Framework (RMF) leverage multiple processes and policies into a coherent whole<br/>Evaluates standards for pure IT operations, "cyber for cyber," and operational/mission cyber evaluations—"cyber for others"<br/>Develops a method for estimating both the vulnerability of the system (i.e., time to exploit) and provides an approach for mitigating risk via policy, training, and technology alternatives<br/>Uses a model-based approach<br/>An Introduction to Cyber Modeling and Simulation is a must read for all technical professionals and students wishing to expand their knowledge of cyber M&S for future professional work. <br/><br/>
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Brief Review of Cyber Incidents
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Introduction to Cyber Modeling and Simulation (M&S)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Cyber Standards for Modeling and Simulation
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9820806
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) 005.8 (Online Access) EB0036 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha