LEADER 04158nam 2200541 450 001 9910528267103321 005 20230824165604.0 010 $a1-119-42084-9 010 $a1-119-42081-4 035 $a(CKB)4100000006994819 035 $a(Au-PeEL)EBL5520841 035 $a(OCoLC)1055041023 035 $a(CaSebORM)9781119420873 035 $a(MiAaPQ)EBC5520841 035 $a(EXLCZ)994100000006994819 100 $a20181010d2019 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 13$aAn introduction to cyber modeling and simulation /$fJerry M. Couretas 205 $aFirst edition 210 1$aHoboken, New Jersey :$cWILEY,$d[2019] 210 4$dİ2019 215 $a1 online resource (190 pages) 225 1 $aWiley series in modeling and simulation. 225 0 $aTHEi Wiley ebooks. 311 $a1-119-42087-3 320 $aIncludes bibliographical references and index. 327 $aBrief review of cyber incidents -- Cyber security : an introduction to assessment and maturity frameworks -- Introduction to cyber modeling and simulation (M&S) -- Technical and operational scenarios -- Cyber standards for M&S -- Cyber course of action (COA) strategies -- Cyber computer assisted exercise (CAX) and situational awareness (SA) via cyber M&S -- Cyber model based evaluation background -- Cyber M&S & system risk analysis -- Cyber modeling & simulation for test and evaluation (T&E) -- Developing model based cyber M&S frameworks -- Appendix : cyber M&S supporting data, tools & techniques. 330 $aIntroduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments, the author presents the overall information assurance process, incorporating the people, policies, processes, and technologies currently available in the field. The author ties up the various threads that currently compose cyber M&S into a coherent view of what is measurable, simulative, and usable in order to evaluate systems for assured operation. An Introduction to Cyber Modeling and Simulation provides the reader with examples of tools and technologies currently available for performing cyber modeling and simulation. It examines how decision-making processes may benefit from M&S in cyber defense. It also examines example emulators, simulators and their potential combination. The book also takes a look at corresponding verification and validation (V&V) processes, which provide the operational community with confidence in knowing that cyber models represent the real world. This book: Explores the role of cyber M&S in decision making Provides a method for contextualizing and understanding cyber risk Shows how concepts such the Risk Management Framework (RMF) leverage multiple processes and policies into a coherent whole Evaluates standards for pure IT operations, "cyber for cyber," and operational/mission cyber evaluations?"cyber for others" Develops a method for estimating both the vulnerability of the system (i.e., time to exploit) and provides an approach for mitigating risk via policy, training, and technology alternatives Uses a model-based approach An Introduction to Cyber Modeling and Simulation is a must read for all technical professionals and students wishing to expand their knowledge of cyber M&S for future professional work. 410 0$aWiley series in modeling and simulation. 606 $aComputer security 606 $aComputer simulation 606 $aCyberinfrastructure 615 0$aComputer security. 615 0$aComputer simulation. 615 0$aCyberinfrastructure. 676 $a005.8 700 $aCouretas$b Jerry M.$f1966-$01052609 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910528267103321 996 $aAn introduction to cyber modeling and simulation$92679474 997 $aUNINA LEADER 02682oam 2200613M 450 001 9910715608803321 005 20191121065747.7 035 $a(CKB)5470000002513981 035 $a(OCoLC)1065984426 035 $a(OCoLC)995470000002513981 035 $a(EXLCZ)995470000002513981 100 $a20070221d1845 ua 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIn Senate of the United States. January 20, 1845. Submitted, and ordered to be printed. Mr. Walker made the following report: (To accompany Bill S. 87.) The Committee on the Judiciary, to which was referred the memorial of the Chickasaw Indians, hereto annexed, marked A, report .. 210 1$a[Washington, D.C.] :$c[publisher not identified],$d1845. 215 $a1 online resource (6 pages) $ctables 225 1 $aSenate document / 28th Congress, 2nd session. Senate ;$vno. 49 225 1 $a[United States congressional serial set ] ;$v[serial no. 450] 300 $aTitle from opening lines of text. 300 $aBatch processed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aFDLP item number not assigned. 517 $aIn Senate of the United States. January 20, 1845. Submitted, and ordered to be printed. Mr. Walker made the following report 606 $aIndians of North America$xGovernment relations 606 $aGovernment securities 606 $aIndians of North America$xClaims 606 $aIndians of North America$xLand tenure 606 $aIndians$vTreaties 606 $aInterest 606 $aInvestments 606 $aActions and defenses 606 $aPublic land sales 608 $aLegislative materials.$2lcgft 615 0$aIndians of North America$xGovernment relations. 615 0$aGovernment securities. 615 0$aIndians of North America$xClaims. 615 0$aIndians of North America$xLand tenure. 615 0$aIndians 615 0$aInterest. 615 0$aInvestments. 615 0$aActions and defenses. 615 0$aPublic land sales. 701 $aWalker$b Robert J$g(Robert John),$f1801-1869$pDemocrat (MS)$056464 801 0$bWYU 801 1$bWYU 801 2$bOCLCO 801 2$bOCLCQ 906 $aBOOK 912 $a9910715608803321 996 $aIn Senate of the United States. January 20, 1845. Submitted, and ordered to be printed. Mr. Walker made the following report: (To accompany Bill S. 87.) The Committee on the Judiciary, to which was referred the memorial of the Chickasaw Indians, hereto annexed, marked A, report .$93532411 997 $aUNINA