1
Published 2022
Springer International Publishing
Table of Contents: ... (Caterina Bigoni) -- Chapter 10. Unsupervised data-driven methods for damage identification in discontinuous...

2
by Grimes, Roger A.
Published 2022
Wiley
Table of Contents: ... ; Minimizing Damage ; Early Responses ; Environment Recovery ; Next Steps ; What Not to Do ; Future...

3
by Krausz, Michael
Published 2014
IT Governance Press
Table of Contents: ...: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence...

4
Published 2017
Springer Nature Singapore
Table of Contents: ..., Representation & Display of Digital Heritage Sites -- Chapter 2. A Methodology to reconstruct large damaged...

5
by Isaacson, Robert L., Spear, Norman E.
Published 1982
Springer US
Table of Contents: ... and Reintegration Following Lateral Hypothalamic Damage -- 3. Sensory Neglect: An Activational Deficit -- 4...

6
by Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents: ... the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...

7
Published 2010
Springer US
Table of Contents: ... Awareness -- Topological Vulnerability Analysis -- Cross-Layer Damage Assessment for Cyber Situational...

8
by Kelly, Bob
Published 2008
Wiley
Table of Contents: .... Protecting User Data -- Ch. 13. Recovering Damaged Systems and Lost Data...

9
Published 2004
Springer US
Table of Contents: ... Oriented System Based Information Flow Model for Damage Assessment -- An Efficient OODB Model for Ensuring...

10
Published 2008
Springer US
Table of Contents: ... -- Trustworthy Records Retention -- Damage Quarantine and Recovery in Data Processing Systems -- Hippocratic...

11
Published 1998
Springer US
Table of Contents: ... for databases with explicit markings of damaged data -- 7 Application of models from epidemiology to metrics...

12
by Walker, Andy
Published 2009
Que
Table of Contents: ... Network -- pt. II. Hardcore Help for Safe and Secure Computing -- 8. Damage Control -- How to Remove...

13
Published 2019
Springer Nature Singapore
Table of Contents: ...-based Cyber Influence Damage Assessment for Exploit in Mobile Device -- Method for predicting pixel...

14
by Porche, Isaac
Published 2011
RAND Corp.
Table of Contents: ... Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes...

15
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Rate -- Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption...

16
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... do their damage and how to protect against them -- Wi-Fi security dangers and protections...

17
by Davidoff, Sherri
Published 2020
Addison-Wesley
... the world's most damaging breaches, Davidoff identifies proven tactics for reducing damage caused...

18
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... Undeniable Signature Scheme -- Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation...

19
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Damage Assessment Latency in Survivable Databases -- XML -- Efficient Processing of Multiple Structural...

20
by Yin, Heng, Song, Dawn
Published 2013
Springer New York
... for decades and has caused billions of dollars damages each year. A large volume of new malware samples...