wyszukanych pozycji: 50
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats
ISBN: 9781461429913 / Angielski / Miękka / 2013 / 184 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network... Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the f... |
|
cena:
350,18 zł |
Cyber Warfare: Building the Scientific Foundation
ISBN: 9783319140384 / Angielski / Twarda / 2015 / 321 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially...
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is ...
|
|
cena:
505,83 zł |
Integrity and Internal Control in Information Systems: Ifip Tc11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Inf
ISBN: 9781475755336 / Angielski / Miękka / 2013 / 294 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future. Building on the issues presented in the preceding volume of this series, this book seeks further answers to the following questions: What precisely do business managers need in order to have confidence in the integrity of their information systems and their data? What is...
Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between t...
|
|
cena:
778,22 zł |
Cyber Deception: Building the Scientific Foundation
ISBN: 9783319326979 / Angielski / Twarda / 2016 / 312 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems.
This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer... This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from t...
|
|
cena:
661,48 zł |
Integrity and Internal Control in Information Systems: Volume 1: Increasing the Confidence in Information Systems
ISBN: 9781475755299 / Angielski / Miękka / 2013 / 370 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Dear readers, Although it is well-known that confidentiality, integrity and availability are high- level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has been charged with exploring the area of the integrity objective within information security and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. In this collection you...
Dear readers, Although it is well-known that confidentiality, integrity and availability are high- level objectives of information security, much of t...
|
|
cena:
583,65 zł |
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
ISBN: 9781489993168 / Angielski / Miękka / 2014 / 204 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling... Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ... |
|
cena:
389,09 zł |
Database Security XII: Status and Prospects
ISBN: 9781475749144 / Angielski / Miękka / 2013 / 296 str. Termin realizacji zamówienia: ok. 20 dni roboczych. New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society.
Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including:
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With...
|
|
cena:
583,65 zł |
Integrity and Internal Control in Information Systems VI: Ifip Tc11 / Wg11.5 Sixth Working Conference on Integrity and Internal Control in Information
ISBN: 9781475788648 / Angielski / Miękka / 2013 / 257 str. Termin realizacji zamówienia: ok. 20 dni roboczych. The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions: what precisely do business managers need in order to have confidence in the integrity of their information systems and their data and what are the challenges IT industry is facing in ensuring this integrity; what are the status and directions of research and development in the area of integrity and internal...
The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, I...
|
|
cena:
389,09 zł |
Database Security XII: Status and Prospects
ISBN: 9780792384885 / Angielski / Twarda / 1999 / 296 str. Termin realizacji zamówienia: ok. 20 dni roboczych. New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society.
Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including:
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With...
|
|
cena:
583,65 zł |
Information Systems Security: 7th International Conference, Iciss 2011, Kolkata, India, December 15-19, 2011, Proceedings
ISBN: 9783642255595 / Angielski / Miękka / 2011 / 388 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, In... |
|
cena:
194,52 zł |
Computer Security - Esorics 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings
ISBN: 9783540883128 / Angielski / Miękka / 2008 / 620 str. Termin realizacji zamówienia: ok. 20 dni roboczych. These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held October 6-8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. From 2002 it has taken place yearly. It attracts an international audience from both the academic and industrial communities. In response to the call for...
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held Oct...
|
|
cena:
194,52 zł |
Integrity and Internal Control in Information Systems: Ifip Tc11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Inf
ISBN: 9780412847707 / Angielski / Twarda / 1998 / 294 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future. Building on the issues presented in the preceding volume of this series, this book seeks further answers to the following questions: What precisely do business managers need in order to have confidence in the integrity of their information systems and their data? What is...
Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between t...
|
|
cena:
778,22 zł |
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
ISBN: 9781461454151 / Angielski / Twarda / 2012 / 204 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling... Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ... |
|
cena:
389,09 zł |
Proceedings of the Ifip Tc 11 23rd International Information Security Conference: Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008
ISBN: 9781441935205 / Angielski / Miękka / 2010 / 738 str. Termin realizacji zamówienia: ok. 20 dni roboczych. These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with I...
|
|
cena:
583,65 zł |
Integrity and Internal Control in Information Systems: Volume 1: Increasing the Confidence in Information Systems
ISBN: 9780412826009 / Angielski / Twarda / 1997 / 370 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Dear readers, Although it is well-known that confidentiality, integrity and availability are high- level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has been charged with exploring the area of the integrity objective within information security and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. In this collection you...
Dear readers, Although it is well-known that confidentiality, integrity and availability are high- level objectives of information security, much of t...
|
|
cena:
583,65 zł |
Information Systems Security: First International Conference, Iciss 2005, Kolkata, India, December 19-21, 2005, Proceedings
ISBN: 9783540307068 / Angielski / Miękka / 2005 / 342 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005. This book discusses the state of the research and practice in information systems security. It covers such topics as: authentication and access control, mobile code security, key management and cryptographic protocols, and more.
Constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005. This book discusses the state ...
|
|
cena:
194,52 zł |
Cyber Deception: Building the Scientific Foundation
ISBN: 9783319813493 / Angielski / Miękka / 2018 / 312 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
|
cena:
661,48 zł |
Cyber Situational Awareness: Issues and Research
ISBN: 9781461424758 / Angielski / Miękka / 2012 / 252 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the...
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future res...
|
|
cena:
389,09 zł |
Cyber Situational Awareness: Issues and Research
ISBN: 9781441901392 / Angielski / Twarda / 2009 / 252 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the...
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future res...
|
|
cena:
389,09 zł |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- And Game-Theoretic Approaches to Cyber Security
ISBN: 9783030307189 / Angielski / Miękka / 2019 / 263 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
|
cena:
225,66 zł |