Foreword, Preface, Acknowledgements, List of Figures, List of Tables, List of Abbreviations, Introduction, 1. Relevance of Cyber Security Innovations, 2. MSSP/MDR National Operator Development, 3. Innovative Methods for Detecting Anomalies, 4. Development of Cyber Security Technologies, Conclusion, References, Index, About the Author
Note: Description based on CIP data; resource not viewed.
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.