Cargando…

The science of cybersecurity and a roadmap to research /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Colfer, Benjamin J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hauppauge, NY : Nova Science Publishers, 2011.
Colección:Defense, security and strategy series.
Computer science, technology and applications.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn847646234
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 110523s2011 nyua o 001 0 eng d
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCO  |d N$T  |d OCLCQ  |d OCLCO  |d YDXCP  |d EBLCP  |d OCLCQ  |d OCLCO  |d OCLCA  |d OCLCQ  |d AZK  |d MERUC  |d AGLDB  |d MOR  |d PIFAG  |d ZCU  |d OCLCQ  |d OCLCA  |d U3W  |d STF  |d WRM  |d OCLCQ  |d VTS  |d NRAMU  |d ICG  |d INT  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d G3B  |d OCLCQ  |d A6Q  |d DKC  |d OCLCQ  |d UKCRE  |d BOL  |d AJS  |d OCLCO  |d OCLCQ 
019 |a 961570289  |a 962681341  |a 975210458  |a 975241760  |a 989325799  |a 1005639824  |a 1018017270  |a 1041923362  |a 1048740300  |a 1049144688  |a 1053595440  |a 1058385407  |a 1066560744  |a 1081283755  |a 1083555223  |a 1097154340  |a 1114394047  |a 1153562612  |a 1181904613 
020 |a 9781611223620  |q (electronic bk.) 
020 |a 1611223628  |q (electronic bk.) 
020 |z 1612098266  |q (hardcover) 
020 |z 9781612098265  |q (hardcover) 
029 1 |a DEBBG  |b BV043776392 
029 1 |a DEBBG  |b BV044087752 
029 1 |a DEBSZ  |b 472789686 
029 1 |a NZ1  |b 15025308 
035 |a (OCoLC)847646234  |z (OCoLC)961570289  |z (OCoLC)962681341  |z (OCoLC)975210458  |z (OCoLC)975241760  |z (OCoLC)989325799  |z (OCoLC)1005639824  |z (OCoLC)1018017270  |z (OCoLC)1041923362  |z (OCoLC)1048740300  |z (OCoLC)1049144688  |z (OCoLC)1053595440  |z (OCoLC)1058385407  |z (OCoLC)1066560744  |z (OCoLC)1081283755  |z (OCoLC)1083555223  |z (OCoLC)1097154340  |z (OCoLC)1114394047  |z (OCoLC)1153562612  |z (OCoLC)1181904613 
050 4 |a TK5105.59  |b .S3843 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 4 |a The science of cybersecurity and a roadmap to research /  |c Benjamin J. Colfer, editor. 
260 |a Hauppauge, NY :  |b Nova Science Publishers,  |c 2011. 
300 |a 1 online resource (198 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
340 |g polychrome.  |2 rdacc  |0 http://rdaregistry.info/termList/RDAColourContent/1003 
347 |a data file 
490 1 |a Defense, security and strategies 
490 1 |a Computer science, technology and applications 
500 |a Includes index. 
505 0 |a Library of Congress Cataloging-in-Publication Data; Contents; Preface; Science of Cybersecurity; Abstract; 1. executive Summary; 2. Problem Statement and Introduction; 3. Cyber-Security as Science -- An Overview; 3.1. Attributes for Cyber-Security; 3.2. Guidance from other Sciences; 3.2.1. Economics; 3.2.2. Meteorology; 3.2.3. Medicine; 3.2.4. Astronomy; 3.2.5. Agriculture; 3.3. Security Degrades Over Time; 3.3.1. Unix passwords; 3.3.2. Lock bumping; 3.4. The Role of Secrecy; 3.5. Aspects of the Science of Cyber-Security; 3.6. Some Science; 3.6.1. Trust; 3.6.2. Cryptography; 3.6.3. Game theory. 
505 8 |a 3.6.4. Model checking3.6.5. Obfuscation; 3.6.6. Machine learning; 3.6.7. Composition of components; 3.7. Applying the Fruits of Science; 3.8. Metrics; 3.9. The Opportunities of New Technologies; 3.10. Experiments and Data; 4. Model Checking; 4.1. Brief Introduction to Spin and Promela; 4.2. Application to Security; 4.2.1. The Needham-Schroeder Protocol; 4.2.2. Promela model of the protocol; 4.3. Scaling Issues; 4.4. Extracting Models from Code; 4.5. Relationship to Hyper-Properties; 5. The Immune System Analogy; 5.1. Basic Biology; 5.2. Learning from the Analogy. 
505 8 |a 5.2.1. The need for adaptive response5.2.2. A mix of sensing modalities; 5.2.3. The need for controlled experiments; 5.2.4. Time scale differences; 5.2.5. Responses to detection; 5.2.6. Final points; 6. Conclusions and Recommendations; A. Appendix: Briefers; References; A Roadmap for Cybersecurity Research; Executive Summary; Introduction; Historical Background; Current Context; Document Format; Background; Future Directions; Acknowledgments; Current Hard Problems in INFOSEC Research; 1. Scalable Trustworthy Systems; Background; What is the problem being addressed? 
505 8 |a What are the potential threats?Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; What are the major research gaps?; Near term; Medium term; Long term; What are the challenges that must be addressed?; What approaches might be desirable?; What R & D is evolutionary and what is more basic, higher risk, game changing?; Resources; Measures of success; What needs to be in place for test and evaluation? 
505 8 |a To what extent can we test real systems?2. Enterprise-Level Metrics (ELMs); Background; What is the problem being addressed?; What are the potential threats?; Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; Definition; Collection; Analysis; Composition; Adoption; What are the major research gaps?; What are some exemplary problems for R & D on this topic? 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Internet  |x Security measures  |x Research. 
650 0 |a Computer crimes  |x Prevention  |x Research. 
650 6 |a Internet  |x Sécurité  |x Mesures  |x Recherche. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
700 1 |a Colfer, Benjamin J. 
776 0 8 |i Print version:  |t Science of cybersecurity and a roadmap to research.  |d Hauppauge, NY : Nova Science Publishers, 2011  |w (DLC) 2011015355 
830 0 |a Defense, security and strategy series. 
830 0 |a Computer science, technology and applications. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=411414  |z Texto completo 
936 |a BATCHLOAD 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL3018666 
938 |a ebrary  |b EBRY  |n ebr10661604 
938 |a EBSCOhost  |b EBSC  |n 411414 
938 |a YBP Library Services  |b YANK  |n 10227801 
994 |a 92  |b IZTAP