Atnaujinkite slapukų nuostatas

El. knyga: National Cyber Summit (NCS) Research Track 2021

Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit’s Research Track, reporting on latest advances on topics ranging from software security to cyber-attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures users and organizations are best prepared for potential negative events. This book is of interest to cyber security researchers, educators and practitioners, as well as students seeking to learn about cyber security.

Part I Cyber Security Education.- An Integrated System for Connecting
Cybersecurity Competency, Student Activities and Career Building.- Simulating
Industrial Control Systems using Node-RED and Unreal Engine 4.- Student
Educational Learning Experience Through Cooperative Research.- Digital
Forensics Education: Challenges and Future Opportunities.- Designing a
Cybersecurity Curriculum Library: Best Practices from Digital Library
Research.- Design of a Virtual Cybersecurity Escape Room.- Part II Cyber
Security Technology.- A Novel Method for the Automated Generation for JOP
Chain Exploits.- Increasing Log Availability in Unmanned Vehicle Systems.-
Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic
Techniques.- Enhancing Secure Coding Assistant System with Design by Contract
and Programming Logic.- Social Engineering Attacks in Healthcare Systems: A
Survey.- Identifying Anomalous Industrial-Control-System Network Flow
Activity Using Cloud Honeypots.- Risks ofElectric Vehicle Supply Equipment
Integration within Building Energy Management System Environments: A Look at
Remote Attack Surface and Implications.