Cloud Native Networking Deep-Dive This book demystifies how Kubernetes networking actually works by walking through a simple but practical simulation that mirrors reality as closely as possible while skipping the gory details. Widespread adoption of container orchestration platforms like Kubernetes have spawned a whole field of industry products startups and academic research in the field of container networking typically termed as cloud-native networking. But what is cloud-native networking? What are the various pieces and how do they fit together? Over recent years most applications have been deployed on cloud infrastructure. Kubernetes has been the widely adopted orchestrator for these clouds. Application developers in most cases are unaware of the underlying plumbing in Kubernetes that holds their applications running as containers. Networking is an integral part of any Kubernetes environment and efficiently drives the various abstractions provided by it. Needless to say it greatly effects the performance of applications which in general have a humongous amount of inter-microservice communication. The impact is even more profound in multiple cloud environments. | Cloud Native Networking Deep-Dive GBP 54.99 1
Cyber Resilience Modern cyber systems acquire more emergent system properties as far as their complexity increases: cyber resilience controllability self-organization proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one. Cyber resilience is the most important feature of any cyber system especially during the transition to the sixth technological stage and related Industry 4. 0 technologies: Artificial Intelligence (AI) Cloud and foggy computing 5G + IoT/IIoT Big Data and ETL Q-computing Blockchain VR/AR etc. We should even consider the cyber resilience as a primary one because the mentioned systems cannot exist without it. Indeed without the sustainable formation made of the interconnected components of the critical information infrastructure it does not make sense to discuss the existence of 4. 0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks. This monograph shows that modern Industry 4. 0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity a potential danger of existing vulnerabilities and “sleep” hardware and software tabs as well as an inadequate efficiency of modern models methods and tools to ensure cyber security reliability response and recovery. GBP 39.99 1
Challenges in Cybersecurity and Privacy - the European Research Landscape Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT since they present additional vulnerabilities due to their constrained capabilities their unattended nature and the usage of potential untrustworthiness components. Likewise identity-theft fraud personal data leakages and other related cyber-crimes are continuously evolving causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context new holistic approaches methodologies techniques and tools are needed to cope with those issues and mitigate cyberattacks by employing novel cyber-situational awareness frameworks risk analysis and modeling threat intelligent systems cyber-threat information sharing methods advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition novel privacy-preserving techniques and crypto-privacy mechanisms identity and eID management systems trust services and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means including the Horizon 2020 Research and Innovation program thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project which aims to cope with digital security and privacy aspects risks threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives the particular challenges they are covering research achievements on security and privacy as well as the techniques outcomes and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely the EU projects analyzed in the book are: ANASTACIA SAINT YAKSHA FORTIKA CYBECO SISSDEN CIPSEC CS-AWARE. RED-Alert Truessec. eu. ARIES LIGHTest CREDENTIAL FutureTrust LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects. GBP 89.99 1