• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
An introduction to cyber modeling and simulation /

پدید آورنده
Jerry M. Couretas.

موضوع
Computer security.,Computer simulation.,Cyberinfrastructure.,Computer security.,Computer simulation.,COMPUTERS-- Computer Simulation.,Cyberinfrastructure.

رده
QA76
.
9
.
C65

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1119420814
(Number (ISBN
1119420830
(Number (ISBN
1119420849
(Number (ISBN
9781119420811
(Number (ISBN
9781119420835
(Number (ISBN
9781119420842
Erroneous ISBN
1119420873
Erroneous ISBN
9781119420873 (hardcover)

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
An introduction to cyber modeling and simulation /
General Material Designation
[Book]
First Statement of Responsibility
Jerry M. Couretas.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Hoboken, NJ :
Name of Publisher, Distributor, etc.
John Wiley & Sons,
Date of Publication, Distribution, etc.
2018.

PROJECTED PUBLICATION DATE

Date
1810

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource.

SERIES

Series Title
Wiley series in modeling and simulation

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Brief review of cyber incidents -- Cyber security : an introduction to assessment and maturity frameworks -- Introduction to cyber modeling and simulation (M&S) -- Technical and operational scenarios -- Cyber standards for M&S -- Cyber course of action (COA) strategies -- Cyber computer assisted exercise (CAX) and situational awareness (SA) via cyber M&S -- Cyber model based evaluation background -- Cyber M&S & system risk analysis -- Cyber modeling & simulation for test and evaluation (T&E) -- Developing model based cyber M&S frameworks -- Appendix : cyber M&S supporting data, tools & techniques.
0

SUMMARY OR ABSTRACT

Text of Note
Introduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally This book provides an overview of cyber modeling and simulation (M & S) developments. Using scenarios, courses of action (COAs), and current M & S and simulation environments, the author presents the overall information assurance process, incorporating the people, policies, processes, and technologies currently available in the field. The author ties up the various threads that currently compose cyber M & S into a coherent view of what is measurable, simulative, and usable in order to evaluate systems for assured operation. An Introduction to Cyber Modeling and Simulation provides the reader with examples of tools and technologies currently available for performing cyber modeling and simulation. It examines how decision-making processes may benefit from M & S in cyber defense. It also examines example emulators, simulators and their potential combination. The book also takes a look at corresponding verification and validation (V & V) processes, which provide the operational community with confidence in knowing that cyber models represent the real world. This book: -Explores the role of cyber M & S in decision making -Provides a method for contextualizing and understanding cyber risk -Shows how concepts such the Risk Management Framework (RMF) leverage multiple processes and policies into a coherent whole -Evaluates standards for pure IT operations, "cyber for cyber," and operational/mission cyber evaluations'"cyber for others"--Develops a method for estimating both the vulnerability of the system (i.e., time to exploit) and provides an approach for mitigating risk via policy, training, and technology alternatives -Uses a model-based approach An Introduction to Cyber Modeling and Simulation is a must read for all technical professionals and students wishing to expand their knowledge of cyber M & S for future professional work.'

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Safari Books Online
Stock Number
CL0501000070

OTHER EDITION IN ANOTHER MEDIUM

Title
Introduction to cyber modeling and simulation
International Standard Book Number
9781119420873

TOPICAL NAME USED AS SUBJECT

Computer security.
Computer simulation.
Cyberinfrastructure.
Computer security.
Computer simulation.
COMPUTERS-- Computer Simulation.
Cyberinfrastructure.

(SUBJECT CATEGORY (Provisional

COM-- 072000

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
C65

PERSONAL NAME - PRIMARY RESPONSIBILITY

Couretas, Jerry M.,1966-

ORIGINATING SOURCE

Date of Transaction
20200822153734.0
Cataloguing Rules (Descriptive Conventions))
rda

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival