2007, ISBN: 9780470128572
New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, * After September 11th, the Department of Defense (DoD) undertooka massive and classified resea… mais…
lehmanns.de Custos de envio:Does not ship to your country., mais custos de envio Details... |
Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats - nuovo livro
ISBN: 9780470128572
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret infor… mais…
hive.co.uk No. 9780470128572. Custos de envio:Instock, Despatched same working day before 3pm, plus shipping costs., mais custos de envio Details... |
ISBN: 9780470128572
Wiley Computer Networking extensive; pages; years; summarize; research; traditional; methods; critical; longer; infrastructures; adequate; information; department; extensive university re… mais…
Perlego.com Custos de envio: EUR 0.00 Details... |
2007, ISBN: 9780470128572
New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, [PU: Wiley], Wiley, 2007
lehmanns.de Custos de envio:Download sofort lieferbar. (EUR 0.00) Details... |
ISBN: 9780470128572
Digital Download, Produktgruppe: Digital Book Service, Subjects, Books, [PU: Wiley]
amazon.co.uk |
2007, ISBN: 9780470128572
New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, * After September 11th, the Department of Defense (DoD) undertooka massive and classified resea… mais…
Cliff Wang:
Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats - nuovo livroISBN: 9780470128572
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret infor… mais…
no/na Perlego.com
ISBN: 9780470128572
Wiley Computer Networking extensive; pages; years; summarize; research; traditional; methods; critical; longer; infrastructures; adequate; information; department; extensive university re… mais…
2007, ISBN: 9780470128572
New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, [PU: Wiley], Wiley, 2007
no/na amazon.co.uk
ISBN: 9780470128572
Digital Download, Produktgruppe: Digital Book Service, Subjects, Books, [PU: Wiley]
Dados bibliográficos do melhor livro correspondente
Autor: | |
Título: | |
Número ISBN: |
Dados detalhados do livro - Department of Defense Sponsored Information Security Research
EAN (ISBN-13): 9780470128572
ISBN (ISBN-10): 0470128577
Ano de publicação: 2007
Editor/Editora: Wiley
Livro na base de dados desde 2008-12-31T23:29:11-02:00 (Sao Paulo)
Página de detalhes modificada pela última vez em 2024-04-01T10:25:54-03:00 (Sao Paulo)
Número ISBN/EAN: 9780470128572
Número ISBN - Ortografia alternativa:
0-470-12857-7, 978-0-470-12857-2
Ortografia alternativa e termos de pesquisa relacionados:
Autor do livro: wachter, david king, toth, king steven, ralph röber, hislop, sharon, herklotz, robert wang, cliff david, langley
Título do livro: information security, department
Dados da editora
Autor: Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs
Título: Department of Defense Sponsored Information Security Research - New Methods for Protecting Against Cyber Threats
Editora: Wiley; John Wiley & Sons
688 Páginas
Ano de publicação: 2008-02-13
Língua: Inglês
43,99 € (DE)
Not available (reason unspecified)
EA; E107; E-Book; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Computernetzwerke und maschinelle Kommunikation; Computer Science; Informatik; Networking; Netzwerk; Netzwerke; Netzwerke; BB
Foreword. Acknowledgements. Introduction (Steven King). Chapter 1. Architecting Information Infrastructures forSecurity (Cliff Wang). 1.1 Architectures for Secure and Robust DistributedInfrastructures. 1.2 A complex Adaptive System Approach to QoS Assurance andStateful Resource Management for Dependable InformationInfrastructure. 1.3 Anomaly and Misuse Detection in Network TrafficStreams-Checking and Machine Learning Approaches. 1.4 Distributed Systems Security via Logical Framework. 1.5 Distributed Immune Systems for Wireless Networks InformationAssurance. 1.6 Hi-DRA High-Speed, Wide-Area Network Detection, Response,and Analysis. Chapter 2. At the Edges of the Critical InformationInfrastructure (David Hislop, Todd Combs). 2.1 Enabling Dynamic Security Management of Networked Systemsvia Device-Embedded Security. 2.2 Software Model Checking for Embedded Systems. 2.3 Advanced tool Integration for Embedded System Assurance. 2.4 Verification Tools for Embedded Systems. Chapter 3. Software Engineering for Assurance (RalphWachter, Gary Toth). 3.1 Static Analysis to Enhance toe Power of Model Checking forConcurrent Software. 3.2 Protecting COTS from the Inside. 3.3 RAPIDware: Component-Based Development of Adaptive andDependable Middleware. 3.4 Generating Efficient Trust Management Software fromPolicies. 3.5 Modeling and Simulation Environment for Critical InformationProtection. Chapter 4. Malicious Mobile Code (Ralph Wachter, GaryToth). 4.1 Language-Based Security for Malicious Mobile Code. 4.2 Model-Carrying Code: A New Approach to Mobile-CodeSecurity. 4.3 Neutralizing Malicious Mobile Code. Chapter 5. Dependable Critical Information Infrastructure forCommand and Control (Robert Herklotz, Chris Arney). 5.1 Trustworthy Infrastructure, Mechanisms, and Experimentationfor Diffuse Computing. 5.2 Adaptable Situation-Aware Secure Services-Based Systems. 5.3 Detecting Deception in the Military Infosphere: Improvingand Integrating Human Detection Capabilities with AutomatedTools. 5.4 Vulnerability Assessment Tools for Complex InformationNetworks.Outros livros adicionais, que poderiam ser muito similares com este livro:
Último livro semelhante:
9780471787563 Department of Defense Information Security Report (Department of Defense; Bollinger, Terry)
< Para arquivar...