Sisäänkirjautuminen

Gorski, Janusz

Cyberspace Security and Defense: Research Issues

Gorski, Janusz - Cyberspace Security and Defense: Research Issues, e-kirja

175,95€

E-kirja, PDF, Adobe DRM-suojattu
ISBN: 9781402033810
DRM-rajoitukset

TulostusEi sallittu
Kopioi leikepöydälleEi sallittu

Table of contents

Part 1. General Security Issues

1. IT Security Development
Andrzej Bialas

2. A Case for Public and Private Review of Developing it Security Standards
Roger Allan French, Timothy Grance

3. Assuring Critical Information Infrastructure
Sokratis K. Katsikas

4. Systemic Challenges for Critical Information Infrastructure Protection
Marcelo Masera

5. Decentralized Energy Supply to Secure Computer Systems
Igor Tyukhov

Part 2. Dependability

6. Safety Analysis Methods—Software Development Questions
Tadeusz Cichocki

7. Trust Case—A Case for Trustworthiness of IT Infrastructures
Janusz Górski

8. Dependability, Structure, and Infrastructure
Brian Randell

9. Design for Safety and Security of Complex Embedded Systems: A Unified Approach
Erwin Schoitsch

Part 3. Networks

10. Design of Distributed Sensor Networks for Security and Defense
Zdravko Karakehayov

11. A Distributed Approach to the Recognition of Geographically Located IP Devices
George Markowsky, Roman Romanyak, Anatoly Sachenko

12. Situational Awareness and Network Traffic Analysis
John McHugh, Carrie Gates, Damon Becknel

Part 4. Early Warning Information Systems and Secure Access Control

13. Honeynets: Foundations for the Development of Early Warning Information Systems
F. Pouget, M. Dacier, V.H. Pham, H. Debar

14. IRIS Biometrics for Secure Remote Access
Andrzej Pacut, Adam Czajka, Przemek Strzelczyk

15. New Directions in Access Control
Sabrina Capitani Vimercati, Pierangela Samarati

Part 5. Cryptography

16. Improved Block Cipher Counter Mode of Operation Schemes
Ivan Gorbenko, Sergiy Golovashych

17. Electronic Signature in Real World
Vlasta Jošková

18. A Note on Two Significant Developments in Cyberspace Security and Defense
Janusz Kowalik

19. A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol
Bartlomiej Ziólkowski, Janusz Stoklosa

Part 6. Intrusion Detection

20. An Infrastructure for Distributed Event Acquisition
Hervé Debar, Benjamin Morin, Vincent Boissée, Didier Guérin

21. Some Aspects of Neural Network Approach for Intrusion Detection
Vladimir Golovko, Pavel Kochurko

DRM-restrictions

Printing: not available
Clipboard copying: not available

Avainsanat: COMPUTERS / Computer Science COM014000

Tekijä(t)
 
 
Julkaisija
Springer
Julkaisuvuosi
2005
Kieli
en
Painos
1
Kategoria
Tietotekniikka, tietoliikenne
Tiedostomuoto
E-kirja
eISBN (PDF)
9781402033810

Samankaltaisia e-kirjoja