Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Termanini, Rocky, author.

Title The cognitive early warning predictive system using the smart vaccine : the new digital immunity paradigm for smart cities and critical infrastructure / Rocky Termanini. [O'Reilly electronic resource]

Edition 1st.
Publication Info. Boca Raton : Auerbach, 2016.
QR Code
Description 1 online resource : illustrations (black and white)
Contents Too!; Why Was the Term Vaccine Selected?; Why Was the Term Smart Selected?; Magical Analogy between Human Immunity and Digital Immunity; Here Is Digital Immunity; Microcosm of the Smart Vaccine; Awesome Morphology of the Virus; Smart Vaccine Transactional Messages and Services; Overview of Web Services; Web Services Will Have a Big Role; Smart Vaccine Transactional Services (SVS); Summary of the Smart Vaccine Transactional Services and Messages; Websites; ; Critical Infrastructures of Smart Cities ; Why Did Cities Exist?; What Is a Smart City?; What Is a Critical Infrastructure?; Critical Infrastructure Frameworks for Smart Cities; Securing the Critical Infrastructures for Smart Cities: The Plan; United States Computer Emergency Readiness Team (US-CERT); Challenges of US-CERT for Smart Cities; Challenges of Cybersecurity in Smart Cities; The United Arab Emirates Power Grids,
A Must See; Smart Cities Cannot Live without Smart Grids; A Smart City Runs on a Smart Grid; How to Inject Resilience in the Smart Grid; Smart Grid Success Formula; Cyber-Cognitive Early-Warning Model; Holy Grail of the Smart Grid; Two Technologies to Build the Smart Grid; Quantitative Assessment of Vulnerability of Critical Infrastructures; Risk Computation; Supervisory Control and Data Acquisition (SCADA); Stuxnet as Enemy Number 1 for Smart Grids; Response Planning and Preparedness; Modeling the Grid Using Queuing Theory; Smart Grid Information Traffic Analysis; Analytics of a Cyberattack on the Smart Grid; Queuing Formulas; Smart Grid Glossary; Websites; ; State of the Art of Antivirus and CEWPS Technologies ; Historical Synopsis; Virus Hall of Infamy; Anatomy of a Biological (Human) Virus; Anatomy of a Digital Virus; Shopping for a Malice Act; Mainframe Legacy; Introducing the Current Antivirus Vendors.
; The Limping Antivirus Industry; The Flat Tire of an AVT,
No Runflat; Two-Generation Leap; CEWPS Cockpit Is Fully Autonomic; Inoculation Missions of the Smart Vaccine; Analytic Thinking Reduces Belief in Conspiracy Theories; The Immune System and the Nervous System; The Running Mind of the Hacker "Catch Me If You Can"; Glossary; Websites; ; Architecture of the Cognitive Early-Warning Predictive System for Smart Cities ; Digital Immunity; Smart Cities Are Like the Human Body; CEWPS Is the Electronic Shield of Smart Cities; Anatomy of CEWPS and Its Main Components; Glossary and Biography; Websites; ; CEWPS Knowledge and Intelligence ; CEWPS Is the Beginning of Singularity; Structure of CEWPS Knowledge Center; The Cybercrime Knowledge Model; How Does CEWPS Predict Cyberattacks on the Smart City?; How Does CEWPS Prevent Cyberattacks on Smart Cities; Causality Rules; Cybercrime Predictive Analytics for the Smart Cities; Why Do We Need a Predictive Analytics Model for.
Smart Cities?; Understanding of Cybercrime Data in Smart Cities; Collection of Cybercrime Data; Building the Cybercrime Data Model; Deployment of the Cybercrime Data Model; Processes and Variables of the Data Model; References; Websites; ; Big Data of Cybercrime and Terrorism: How to Capture and Manage It ; What Is Big Data and What Does It Mean?; Our Societal Waste Is Big Data; In the Beginning, There Was a Crashed Message; Attributes of Big Data; New Big Data Cybercrime; CEWPS and Big Data Synergism; CEWPS Cybercrime Analytics; What Kind of Data Do Smart Cities Need?; Data Extracted from Law Enforcement Crime Repositories; Big Data Support for Critical Infrastructures; Interfacing CEWPS with Big Data; Big Data Cybercrime Data; Where to Get Cyberterrorism Data; Resources; Big Data Glossary; Websites; ; Part II; ; CEWPS Anatomy, Smart Vaccine,
And Man-Made B Cell ; A Word on Virus Anatomy; The Digital Immune System; Analogy between the Human Immune and Digital Immune Systems; Anatomy of the Present Computer Virus; How Does the Present (Classic) Vaccine Work?; Anatomy of the Smart Vaccine; A Word on Artificial Intelligence (AI); Smart Vaccine in the Battlefield; The Battlefield; The Appeal of Cyberterrorism; Terrorism Levels; The Most Challenging Attacks for the Smart Vaccine; Analysis of Cyberterrorism; The Miraculous Fight of the Smart Vaccine; The Purpose of the SCADA System; The Terrorist Team; The Attack; Here Is What the Smart Vaccine Did; Honeypots and Honeynet; Additional Reading for Electrical Engineers; Websites; ; Smart Cloud Is Here: Vaccination as a Service ; Introduction of Digital Immunity; Cloud 101 Primer; Three Technologies into One: Cloud Computing, Web Services,
And Service-Oriented Architecture; First Technology: Cloud Computing; Essential Characteristics; Cloud Service Delivery Models; Types of Cloud Models; Cloud Standards and Practices for the Smart Cloud; Connectivity Requirements for Cloud-Based Digital Immunity; The Smart Vaccine Cloud-Based Reference Architecture; Second Technology: ServiceOriented Architecture; Third Technology: Web Services; VaaS Vaccination Cloud Services; Workflow of the VaaS Vaccination Process; Three Scenarios of an SOA-Based Vaccination; Criticality of the Smart Vaccine Response Time; Harnessing SOA Technology; Cloud Computing Glossary; Websites; ; Internet of Things,
; Damages; Historical Background; The New Generation of Stuxnet; Cloud-Based Stuxnet: The Virus Rain Attack; Nanotechnology-Embedded Stuxnet (Epoch-5 Nanochip-Stuxnet); Digital Immunity Grid Layer; The S-Curve Evolution of the Digital Immunity System CEWPS; References; Websites; ; Epilogue; ; Appendix A: CEWPS Deployment Team ; CEWPS/SV T.
Subject Computer security.
Information warfare.
Cyberterrorism -- Prevention.
Computer crimes.
Sécurité informatique.
Guerre de l'information.
Criminalité informatique.
Computer crimes.
Computer security.
Cyberterrorism -- Prevention.
Information warfare.
Other Form: Print version : 9781498726511
ISBN 9781498726535 (PDF ebook)
1498726534 (PDF ebook)
(hbk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information