logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

[eBook Code] Department of Defense Sponsored Information Security Research

[eBook Code] Department of Defense Sponsored Information Security Research (eBook Code, 1st)

(New Methods for Protecting Against Cyber Threats)

Department of Defense (지은이), Cliff Wang, Ralph Wachter, Steven King, Robert Herklotz (엮은이)
Wiley
96,200원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
76,960원 -20% 0원
0원
76,960원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

[eBook Code] Department of Defense Sponsored Information Security Research
eBook 미리보기

책 정보

· 제목 : [eBook Code] Department of Defense Sponsored Information Security Research (eBook Code, 1st) (New Methods for Protecting Against Cyber Threats)
· 분류 : 외국도서 > 컴퓨터 > 네트워킹 > 일반
· ISBN : 9780470128572
· 쪽수 : 688쪽
· 출판일 : 2007-09-11

목차

Foreword.

Acknowledgements.

Introduction (Steven King).

Chapter 1. Architecting Information Infrastructures for Security (Cliff Wang).

1.1 Architectures for Secure and Robust Distributed Infrastructures.

1.2 A complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure.

1.3 Anomaly and Misuse Detection in Network Traffic Streams-Checking and Machine Learning Approaches.

1.4 Distributed Systems Security via Logical Framework.

1.5 Distributed Immune Systems for Wireless Networks Information Assurance.

1.6 Hi-DRA High-Speed, Wide-Area Network Detection, Response, and Analysis.

Chapter 2. At the Edges of the Critical Information Infrastructure (David Hislop, Todd Combs).

2.1 Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security.

2.2 Software Model Checking for Embedded Systems.

2.3 Advanced tool Integration for Embedded System Assurance.

2.4 Verification Tools for Embedded Systems.

Chapter 3. Software Engineering for Assurance (Ralph Wachter, Gary Toth).

3.1 Static Analysis to Enhance toe Power of Model Checking for Concurrent Software.

3.2 Protecting COTS from the Inside.

3.3 RAPIDware: Component-Based Development of Adaptive and Dependable Middleware.

3.4 Generating Efficient Trust Management Software from Policies.

3.5 Modeling and Simulation Environment for Critical Information Protection.

Chapter 4. Malicious Mobile Code (Ralph Wachter, Gary Toth).

4.1 Language-Based Security for Malicious Mobile Code.

4.2 Model-Carrying Code: A New Approach to Mobile-Code Security.

4.3 Neutralizing Malicious Mobile Code.

Chapter 5. Dependable Critical Information Infrastructure for Command and Control (Robert Herklotz, Chris Arney).

5.1 Trustworthy Infrastructure, Mechanisms, and Experimentation for Diffuse Computing.

5.2 Adaptable Situation-Aware Secure Services-Based Systems.

5.3 Detecting Deception in the Military Infosphere: Improving and Integrating Human Detection Capabilities with Automated Tools.

5.4 Vulnerability Assessment Tools for Complex Information Networks.

저자소개

Ralph Wachter (엮은이)    정보 더보기
펼치기
Robert Herklotz (엮은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책