Skip to main content
  • Book
  • © 2015

Cyber Security: Analytics, Technology and Automation

  • Contains a unique codification of cyber security
  • Excellent book for students, postgraduates and professionals
  • Gives a profound overview of the most spoken phenomenon of this time
  • Includes supplementary material: sn.pub/extras

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 chapters)

  1. Front Matter

    Pages i-x
  2. Cyber World Today

    1. Front Matter

      Pages 1-1
    2. Phenomena in the Cyber World

      • Martti Lehto
      Pages 3-29
    3. Cyber World as a Social System

      • Tuija Kuusisto, Rauno Kuusisto
      Pages 31-43
    4. Citizens in Cyber World—Despatches from the Virtual “Clinic”

      • Torsti Sirén, Aki-Mauri Huhtinen
      Pages 45-62
  3. Cyber Security Threats, Legality and Strategy

    1. Front Matter

      Pages 71-71
    2. Coder, Hacker, Soldier, Spy

      • Kenneth Geers
      Pages 73-87
    3. Cyber Warfare

      • Rain Ottis
      Pages 89-96
    4. Deception in the Cyber-World

      • William Hutchinson
      Pages 97-107
    5. Legal Framework of Cyber Security

      • Eneken Tikk-Ringas
      Pages 109-127
    6. Finnish Cyber Security Strategy and Implementation

      • Antti Sillanpää, Harri Roivainen, Martti Lehto
      Pages 129-144
  4. Cyber Security Technology

    1. Front Matter

      Pages 145-145
    2. Timing and Side Channel Attacks

      • Nezer Zaidenberg, Amit Resh
      Pages 183-194
    3. Knowledge Discovery from Network Logs

      • Tuomo Sipola
      Pages 195-203
    4. Trusted Computing and DRM

      • Nezer Zaidenberg, Pekka Neittaanmäki, Michael Kiperberg, Amit Resh
      Pages 205-212
  5. Cyber Security and Automation

    1. Front Matter

      Pages 213-213
    2. Cyber Security and Protection of ICS Systems: An Australian Example

      • Matthew J. Warren, Shona Leitch
      Pages 215-228
    3. Towards Dependable Automation

      • Jari Seppälä, Mikko Salmenperä
      Pages 229-249

About this book

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.

The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

Reviews

“This wonderfully documented text explores the mechanics and methods of digital security and the steps necessary to ensure privacy. … For the professional who is mathematically literate, the book is a must-read. The reference sections that follow each chapter rival that of any PhD thesis ever written. It is magnificent in its scholarship.” (James Van Speybroeck, Computing Reviews, October, 2015)

Editors and Affiliations

  • Dept of Mathematical Information Technology, University of Jyväskylä, Jyväskylä, Finland

    Martti Lehto

  • Mathematical Information Technology, University of Jyväskylä, Jyväskylä, Finland

    Pekka Neittaanmäki

About the editors

Pekka Neittaanmäki is Professor in Scientific Computing and Dean of the Faculty of Information Technology and Head of COMAS (Computing and Mathematical Sciences) Graduate School at the University of Jyväskylä and Adjunct Professor at the University of Houston, USA. His research interests are mathematical and numerical modeling, signal analysis, data analysis, optimization, and optimal control. He is the author or co-author of more than 350 publications in various parts of numerical analysis and applied mathematics including 16 books. He has supervised more than 80 PhD theses. He has participated in many industrial projects in Finland and Europe including among others paper machine, telecommunication, process industry as well as medical diagnostics applications.

Martti Lehto Col (ret.) is Adjunct professor in Cyber Security in the Department of Mathematical Information Technology in of the Faculty of Information Technology at the University of Jyväskylä. He has over 30 years ofexperience as developer and leader of C4ISR Systems in Finnish Defence Forces. He is now a Cyber security and Cyber defence researcher and teacher and he also coordinates the Cyber Security MSc. and Doctoral programmes.  He has over 50 publications, research reports and articles on areas of C4ISR systems, cyber security and defence, information warfare and defence policy. He has participated many cyber security programs, like Finland's cyber security strategy, the Ministry of Employment and the Economy’s Innovative Cities (INKA) cyber security project and ENISA NIS Platform WG 3.

Bibliographic Information

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access