Information assurance : dependability and security in networked systems /
In an age of electronic espionage and Homeland Security threats, protect your data and delivery system from prying eyes and irreversible collapse.
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington, Mass. :
Elsevier/Morgan Kaufmann,
©2008.
|
Colección: | Morgan Kaufmann series in computer security.
Morgan Kaufmann series in networking. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | OR_ocn319430952 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 090427s2008 maua ob 001 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d OCLCQ |d CEF |d OCLCQ |d NHM |d DEBSZ |d OCLCO |d CNNAI |d OCLCF |d OCLCQ |d EBLCP |d MERUC |d UKDOC |d OCLCQ |d U3W |d OCLCA |d ICG |d INT |d OCLCQ |d WYU |d OTZ |d TKN |d DKC |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 437196964 |a 476125519 |a 1044264547 |a 1056372874 | ||
020 | |a 9780123735669 | ||
020 | |a 0123735661 | ||
020 | |a 9780080555881 |q (electronic bk.) | ||
020 | |a 0080555888 |q (electronic bk.) | ||
029 | 1 | |a AU@ |b 000048831354 | |
029 | 1 | |a CHBIS |b 006148660 | |
029 | 1 | |a CHVBK |b 171386485 | |
029 | 1 | |a DEBBG |b BV044128191 | |
029 | 1 | |a DEBSZ |b 355395150 | |
029 | 1 | |a DEBSZ |b 430461453 | |
029 | 1 | |a DEBSZ |b 449108481 | |
029 | 1 | |a HEBIS |b 29146839X | |
035 | |a (OCoLC)319430952 |z (OCoLC)437196964 |z (OCoLC)476125519 |z (OCoLC)1044264547 |z (OCoLC)1056372874 | ||
037 | |a CL0500000038 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 |b .I5247 2008 | |
082 | 0 | 4 | |a 005.8 Q1 2008 [ONLINE] |
049 | |a UAMI | ||
245 | 0 | 0 | |a Information assurance : |b dependability and security in networked systems / |c Yi Qian [and others]. |
260 | |a Burlington, Mass. : |b Elsevier/Morgan Kaufmann, |c ©2008. | ||
300 | |a 1 online resource (xxxvii, 537 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Morgan Kaufmann series in networking | |
490 | 1 | |a Morgan Kaufmann series in computer security | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a 1. Information Assurance / Yi Qian, James Joshi, David Tipper and Prashant Krishnamurthy -- Information Assurance: Dependability and Security of Networked Information Systems -- Book Organization -- pt. I. Foundational Background on Security and Dependability Techniques -- 2. Network Security / James Joshi and Prashant Krishnamurthy -- Network Attacks and Security Issues -- Protection and Prevention -- Detection -- Assessment and Response -- 3. Security for Distributed Systems: Foundations of Access Control / Elisa Bertino and Jason Crampton -- Identification and Authentication -- Access Control -- Access Control in Distributed Systems -- Digital Identity Management -- 4. Network Survivability / Bjorn Jager, John Doucette and David Tipper -- Prevention Techniques -- Survivable Network Design and Traffic Restoration Concepts -- Transport Network Recovery Techniques -- Survivable Network Design Techniques -- Multilayer Issues -- Conclusion and Future Research Areas -- 5. System Survivability / Axel Krings -- Survivability and the Impact of Fault Models -- Design for Survivability -- Decentralized Storage -- Survivability of Large Distributed Systems -- Borrowing from Well-established Fields -- pt. II. Modeling the Interaction between Dependability and Security -- 6. Taxonomy and Framework for Integrating Dependability and Security / Jiankun Hu, Peter Bertok and Zahir Tari -- Basic Concepts and Related Work -- Proposed Taxonomy and Framework -- Dependability, Security, and their Attributes -- The Means to Attain Dependability and Security -- 7. Stochastic Modeling Techniques for Secure and Survivable Systems / Kishor S. Trivedi, Vaneeta Jindal and Selvamuthu Dharmaraja -- Analytical Modeling Techniques -- Security Modeling -- Survivability Modeling -- 8. Integrated Dependability and Security Evaluation Using Game Theory and Markov Models / Bjarne E. Helvik, Karin Sallhammar and Svein J. Knapskog -- Stochastic Modeling -- Predicting Attacker Behavior -- Defining and Solving the Game -- Tuning the Game Parameters -- Case Study: DNS Service -- 9. Scenario Graphs Applied to Network Security / Jeannette M. Wing -- Algorithms for Generating Scenario Graphs -- Attack Graphs are Scenario Graphs -- Network Attack Graphs -- Example Network -- Attack Graph Analysis -- Practical Experience -- Related Work -- Future Work and Conclusion -- 10. Vulnerability-Centric Alert Correlation / Lingyu Wang and Sushil Jajodia -- Review of Alert Correlation and Related Techniques -- Attack Graph -- Alert Correlation, Hypothesis, Prediction, and Aggregation -- pt. III. Design and Architectural Issues for Secure and Dependable Systems -- 11. Monitoring and Detecting Attacks in All-Optical Networks / Arun K. Somani and Tao Wu -- Crosstalk Attack Features and Monitoring Techniques -- Node, Attack, and Monitor Models -- Necessary and Sufficient Conditions for Crosstalk Attack Detection -- One-crosstalk Attack Diagnosable Conditions -- k-Crosstalk Attacks in the Network -- Sparse Monitoring and Routing Algorithms -- Sparse Monitoring, Test Connection, and Routing for More than One Original Attack Flow -- 12. Robustness Evaluation of Operating Systems / Andreas Johansson and Neeraj Suri -- Evaluation Goals -- Target System -- Error Model and Workload Selection -- Robustness Metrics -- Presentation and Interpretation of Results -- 13. Intrusion Response Systems: A Survey / Bingrui Foo, Matthew W. Glause, Gaspar M. Howard, Yu-Sung Wu, Saurabh Bagchi and Eugene H. Spafford -- Static Decision-making Systems -- Dynamic Decision-making Systems -- Intrusion Tolerance through Diverse Replicas -- Responses to Specific Kinds of Attacks -- Benchmarking Intrusion Response Systems -- Thoughts on Evolution of IRS Technology -- 14. Secure and Resilient Routing: Building Blocks for Resilient Network Architectures / Deep Medhi and Dijiang Huang -- Traffic Engineering Perspective and its Relation to Network Robustness -- Components of a Resilient Network Architecture -- Threats and Countermeasures in Link-State Routing -- Resilient Architecture: Virtualization and Routing -- Secure Group Communication -- 15. Security and Survivability of Wireless Systems / Yi Qian, Puerto Rico, Prashant Krishnamurthy and David Tipper -- Background -- Current Security Approaches in Wireless Networks -- Current Survivability Approaches in Wireless Networks -- Framework for Wireless Network Survivability and Security -- Interaction between Survivability and Security in Wireless Networks -- 16. Integrated Fault and Security Management / Ehab Al-Shaer and Yan Chen -- Active Integrated Fault Identification Framework -- Fault and Security Management on High-speed Networks. | |
520 | |a In an age of electronic espionage and Homeland Security threats, protect your data and delivery system from prying eyes and irreversible collapse. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer networks |x Reliability. | |
650 | 0 | |a Computer security. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Fiabilité. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Computer networks |x Reliability. |2 blmlsh | |
650 | 7 | |a Computer security. |2 blmlsh | |
650 | 7 | |a Computer networks |x Reliability |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Qian, Yi, |d 1962- | |
776 | 1 | |z 9780123735669 | |
830 | 0 | |a Morgan Kaufmann series in computer security. | |
830 | 0 | |a Morgan Kaufmann series in networking. | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780123735669/?ar |z Texto completo (Requiere registro previo con correo institucional) |
938 | |a 123Library |b 123L |n 40635 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL328312 | ||
994 | |a 92 |b IZTAP |