Cargando…

Information assurance : dependability and security in networked systems /

In an age of electronic espionage and Homeland Security threats, protect your data and delivery system from prying eyes and irreversible collapse.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Qian, Yi, 1962-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, Mass. : Elsevier/Morgan Kaufmann, ©2008.
Colección:Morgan Kaufmann series in computer security.
Morgan Kaufmann series in networking.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn319430952
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 090427s2008 maua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d CEF  |d OCLCQ  |d NHM  |d DEBSZ  |d OCLCO  |d CNNAI  |d OCLCF  |d OCLCQ  |d EBLCP  |d MERUC  |d UKDOC  |d OCLCQ  |d U3W  |d OCLCA  |d ICG  |d INT  |d OCLCQ  |d WYU  |d OTZ  |d TKN  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 437196964  |a 476125519  |a 1044264547  |a 1056372874 
020 |a 9780123735669 
020 |a 0123735661 
020 |a 9780080555881  |q (electronic bk.) 
020 |a 0080555888  |q (electronic bk.) 
029 1 |a AU@  |b 000048831354 
029 1 |a CHBIS  |b 006148660 
029 1 |a CHVBK  |b 171386485 
029 1 |a DEBBG  |b BV044128191 
029 1 |a DEBSZ  |b 355395150 
029 1 |a DEBSZ  |b 430461453 
029 1 |a DEBSZ  |b 449108481 
029 1 |a HEBIS  |b 29146839X 
035 |a (OCoLC)319430952  |z (OCoLC)437196964  |z (OCoLC)476125519  |z (OCoLC)1044264547  |z (OCoLC)1056372874 
037 |a CL0500000038  |b Safari Books Online 
050 4 |a TK5105.59  |b .I5247 2008 
082 0 4 |a 005.8 Q1 2008 [ONLINE] 
049 |a UAMI 
245 0 0 |a Information assurance :  |b dependability and security in networked systems /  |c Yi Qian [and others]. 
260 |a Burlington, Mass. :  |b Elsevier/Morgan Kaufmann,  |c ©2008. 
300 |a 1 online resource (xxxvii, 537 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Morgan Kaufmann series in networking 
490 1 |a Morgan Kaufmann series in computer security 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a 1. Information Assurance / Yi Qian, James Joshi, David Tipper and Prashant Krishnamurthy -- Information Assurance: Dependability and Security of Networked Information Systems -- Book Organization -- pt. I. Foundational Background on Security and Dependability Techniques -- 2. Network Security / James Joshi and Prashant Krishnamurthy -- Network Attacks and Security Issues -- Protection and Prevention -- Detection -- Assessment and Response -- 3. Security for Distributed Systems: Foundations of Access Control / Elisa Bertino and Jason Crampton -- Identification and Authentication -- Access Control -- Access Control in Distributed Systems -- Digital Identity Management -- 4. Network Survivability / Bjorn Jager, John Doucette and David Tipper -- Prevention Techniques -- Survivable Network Design and Traffic Restoration Concepts -- Transport Network Recovery Techniques -- Survivable Network Design Techniques -- Multilayer Issues -- Conclusion and Future Research Areas -- 5. System Survivability / Axel Krings -- Survivability and the Impact of Fault Models -- Design for Survivability -- Decentralized Storage -- Survivability of Large Distributed Systems -- Borrowing from Well-established Fields -- pt. II. Modeling the Interaction between Dependability and Security -- 6. Taxonomy and Framework for Integrating Dependability and Security / Jiankun Hu, Peter Bertok and Zahir Tari -- Basic Concepts and Related Work -- Proposed Taxonomy and Framework -- Dependability, Security, and their Attributes -- The Means to Attain Dependability and Security -- 7. Stochastic Modeling Techniques for Secure and Survivable Systems / Kishor S. Trivedi, Vaneeta Jindal and Selvamuthu Dharmaraja -- Analytical Modeling Techniques -- Security Modeling -- Survivability Modeling -- 8. Integrated Dependability and Security Evaluation Using Game Theory and Markov Models / Bjarne E. Helvik, Karin Sallhammar and Svein J. Knapskog -- Stochastic Modeling -- Predicting Attacker Behavior -- Defining and Solving the Game -- Tuning the Game Parameters -- Case Study: DNS Service -- 9. Scenario Graphs Applied to Network Security / Jeannette M. Wing -- Algorithms for Generating Scenario Graphs -- Attack Graphs are Scenario Graphs -- Network Attack Graphs -- Example Network -- Attack Graph Analysis -- Practical Experience -- Related Work -- Future Work and Conclusion -- 10. Vulnerability-Centric Alert Correlation / Lingyu Wang and Sushil Jajodia -- Review of Alert Correlation and Related Techniques -- Attack Graph -- Alert Correlation, Hypothesis, Prediction, and Aggregation -- pt. III. Design and Architectural Issues for Secure and Dependable Systems -- 11. Monitoring and Detecting Attacks in All-Optical Networks / Arun K. Somani and Tao Wu -- Crosstalk Attack Features and Monitoring Techniques -- Node, Attack, and Monitor Models -- Necessary and Sufficient Conditions for Crosstalk Attack Detection -- One-crosstalk Attack Diagnosable Conditions -- k-Crosstalk Attacks in the Network -- Sparse Monitoring and Routing Algorithms -- Sparse Monitoring, Test Connection, and Routing for More than One Original Attack Flow -- 12. Robustness Evaluation of Operating Systems / Andreas Johansson and Neeraj Suri -- Evaluation Goals -- Target System -- Error Model and Workload Selection -- Robustness Metrics -- Presentation and Interpretation of Results -- 13. Intrusion Response Systems: A Survey / Bingrui Foo, Matthew W. Glause, Gaspar M. Howard, Yu-Sung Wu, Saurabh Bagchi and Eugene H. Spafford -- Static Decision-making Systems -- Dynamic Decision-making Systems -- Intrusion Tolerance through Diverse Replicas -- Responses to Specific Kinds of Attacks -- Benchmarking Intrusion Response Systems -- Thoughts on Evolution of IRS Technology -- 14. Secure and Resilient Routing: Building Blocks for Resilient Network Architectures / Deep Medhi and Dijiang Huang -- Traffic Engineering Perspective and its Relation to Network Robustness -- Components of a Resilient Network Architecture -- Threats and Countermeasures in Link-State Routing -- Resilient Architecture: Virtualization and Routing -- Secure Group Communication -- 15. Security and Survivability of Wireless Systems / Yi Qian, Puerto Rico, Prashant Krishnamurthy and David Tipper -- Background -- Current Security Approaches in Wireless Networks -- Current Survivability Approaches in Wireless Networks -- Framework for Wireless Network Survivability and Security -- Interaction between Survivability and Security in Wireless Networks -- 16. Integrated Fault and Security Management / Ehab Al-Shaer and Yan Chen -- Active Integrated Fault Identification Framework -- Fault and Security Management on High-speed Networks. 
520 |a In an age of electronic espionage and Homeland Security threats, protect your data and delivery system from prying eyes and irreversible collapse. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Reliability. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Fiabilité. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer networks  |x Reliability.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer networks  |x Reliability  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Qian, Yi,  |d 1962- 
776 1 |z 9780123735669 
830 0 |a Morgan Kaufmann series in computer security. 
830 0 |a Morgan Kaufmann series in networking. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780123735669/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a 123Library  |b 123L  |n 40635 
938 |a EBL - Ebook Library  |b EBLB  |n EBL328312 
994 |a 92  |b IZTAP