|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn847646234 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
110523s2011 nyua o 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCO
|d N$T
|d OCLCQ
|d OCLCO
|d YDXCP
|d EBLCP
|d OCLCQ
|d OCLCO
|d OCLCA
|d OCLCQ
|d AZK
|d MERUC
|d AGLDB
|d MOR
|d PIFAG
|d ZCU
|d OCLCQ
|d OCLCA
|d U3W
|d STF
|d WRM
|d OCLCQ
|d VTS
|d NRAMU
|d ICG
|d INT
|d VT2
|d AU@
|d OCLCQ
|d WYU
|d G3B
|d OCLCQ
|d A6Q
|d DKC
|d OCLCQ
|d UKCRE
|d BOL
|d AJS
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 961570289
|a 962681341
|a 975210458
|a 975241760
|a 989325799
|a 1005639824
|a 1018017270
|a 1041923362
|a 1048740300
|a 1049144688
|a 1053595440
|a 1058385407
|a 1066560744
|a 1081283755
|a 1083555223
|a 1097154340
|a 1114394047
|a 1153562612
|a 1181904613
|
020 |
|
|
|a 9781611223620
|q (electronic bk.)
|
020 |
|
|
|a 1611223628
|q (electronic bk.)
|
020 |
|
|
|z 1612098266
|q (hardcover)
|
020 |
|
|
|z 9781612098265
|q (hardcover)
|
029 |
1 |
|
|a DEBBG
|b BV043776392
|
029 |
1 |
|
|a DEBBG
|b BV044087752
|
029 |
1 |
|
|a DEBSZ
|b 472789686
|
029 |
1 |
|
|a NZ1
|b 15025308
|
035 |
|
|
|a (OCoLC)847646234
|z (OCoLC)961570289
|z (OCoLC)962681341
|z (OCoLC)975210458
|z (OCoLC)975241760
|z (OCoLC)989325799
|z (OCoLC)1005639824
|z (OCoLC)1018017270
|z (OCoLC)1041923362
|z (OCoLC)1048740300
|z (OCoLC)1049144688
|z (OCoLC)1053595440
|z (OCoLC)1058385407
|z (OCoLC)1066560744
|z (OCoLC)1081283755
|z (OCoLC)1083555223
|z (OCoLC)1097154340
|z (OCoLC)1114394047
|z (OCoLC)1153562612
|z (OCoLC)1181904613
|
050 |
|
4 |
|a TK5105.59
|b .S3843 2011eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
4 |
|a The science of cybersecurity and a roadmap to research /
|c Benjamin J. Colfer, editor.
|
260 |
|
|
|a Hauppauge, NY :
|b Nova Science Publishers,
|c 2011.
|
300 |
|
|
|a 1 online resource (198 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
340 |
|
|
|g polychrome.
|2 rdacc
|0 http://rdaregistry.info/termList/RDAColourContent/1003
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Defense, security and strategies
|
490 |
1 |
|
|a Computer science, technology and applications
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Library of Congress Cataloging-in-Publication Data; Contents; Preface; Science of Cybersecurity; Abstract; 1. executive Summary; 2. Problem Statement and Introduction; 3. Cyber-Security as Science -- An Overview; 3.1. Attributes for Cyber-Security; 3.2. Guidance from other Sciences; 3.2.1. Economics; 3.2.2. Meteorology; 3.2.3. Medicine; 3.2.4. Astronomy; 3.2.5. Agriculture; 3.3. Security Degrades Over Time; 3.3.1. Unix passwords; 3.3.2. Lock bumping; 3.4. The Role of Secrecy; 3.5. Aspects of the Science of Cyber-Security; 3.6. Some Science; 3.6.1. Trust; 3.6.2. Cryptography; 3.6.3. Game theory.
|
505 |
8 |
|
|a 3.6.4. Model checking3.6.5. Obfuscation; 3.6.6. Machine learning; 3.6.7. Composition of components; 3.7. Applying the Fruits of Science; 3.8. Metrics; 3.9. The Opportunities of New Technologies; 3.10. Experiments and Data; 4. Model Checking; 4.1. Brief Introduction to Spin and Promela; 4.2. Application to Security; 4.2.1. The Needham-Schroeder Protocol; 4.2.2. Promela model of the protocol; 4.3. Scaling Issues; 4.4. Extracting Models from Code; 4.5. Relationship to Hyper-Properties; 5. The Immune System Analogy; 5.1. Basic Biology; 5.2. Learning from the Analogy.
|
505 |
8 |
|
|a 5.2.1. The need for adaptive response5.2.2. A mix of sensing modalities; 5.2.3. The need for controlled experiments; 5.2.4. Time scale differences; 5.2.5. Responses to detection; 5.2.6. Final points; 6. Conclusions and Recommendations; A. Appendix: Briefers; References; A Roadmap for Cybersecurity Research; Executive Summary; Introduction; Historical Background; Current Context; Document Format; Background; Future Directions; Acknowledgments; Current Hard Problems in INFOSEC Research; 1. Scalable Trustworthy Systems; Background; What is the problem being addressed?
|
505 |
8 |
|
|a What are the potential threats?Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; What are the major research gaps?; Near term; Medium term; Long term; What are the challenges that must be addressed?; What approaches might be desirable?; What R & D is evolutionary and what is more basic, higher risk, game changing?; Resources; Measures of success; What needs to be in place for test and evaluation?
|
505 |
8 |
|
|a To what extent can we test real systems?2. Enterprise-Level Metrics (ELMs); Background; What is the problem being addressed?; What are the potential threats?; Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; Definition; Collection; Analysis; Composition; Adoption; What are the major research gaps?; What are some exemplary problems for R & D on this topic?
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Internet
|x Security measures
|x Research.
|
650 |
|
0 |
|a Computer crimes
|x Prevention
|x Research.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures
|x Recherche.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
700 |
1 |
|
|a Colfer, Benjamin J.
|
776 |
0 |
8 |
|i Print version:
|t Science of cybersecurity and a roadmap to research.
|d Hauppauge, NY : Nova Science Publishers, 2011
|w (DLC) 2011015355
|
830 |
|
0 |
|a Defense, security and strategy series.
|
830 |
|
0 |
|a Computer science, technology and applications.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=411414
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3018666
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10661604
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 411414
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10227801
|
994 |
|
|
|a 92
|b IZTAP
|