Doprava zdarma se Zásilkovnou nad 1 299 Kč
PPL Parcel Shop 54 Balík do ruky 74 Balíkovna 49 GLS 54 Kurýr GLS 64 Zásilkovna 44 PPL 99

Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems

Jazyk AngličtinaAngličtina
Kniha Brožovaná
Kniha Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems Igor Kotenko
Libristo kód: 09010158
Nakladatelství River Publishers, ledna 2014
Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue t... Celý popis
? points 135 b
1 351
Skladem u dodavatele Odesíláme za 14-18 dnů

30 dní na vrácení zboží


Mohlo by vás také zajímat


Legend Trilogy Boxed Set Marie Lu / Pevná
common.buy 1 316
Selected Writings Anna Freud / Brožovaná
common.buy 437
Observer Le Bouddhisme Dans La Societe Mondiale Thibeault-F / Brožovaná
common.buy 2 951
Alien Among Anxious Artists Dennis Parks / Pevná
common.buy 948
Cookie Doughlicious Lara Ferroni / Pevná
common.buy 427
AOP CLASSICAL COLLECTION CL 1 J & WILLIA O'REILLY / Brožovaná
common.buy 176
Kinder-Verwirr-Buch Joachim Ringelnatz / Brožovaná
common.buy 539
Minecraft - leicht gemacht! Andreas Zintzsch / Brožovaná
common.buy 263
Reminiscences of A Veteran Major Thomas Bunbury 80th Regt. / Brožovaná
common.buy 594

Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face. The papers in this issue are: . "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years. . "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations. . "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne żc żka, Peter Hanác żek and Matej Kac żic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software. . "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection. . "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.

Informace o knize

Plný název Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems
Jazyk Angličtina
Vazba Kniha - Brožovaná
Datum vydání 2014
Počet stran 96
EAN 9788793102965
ISBN 9788793102965
Libristo kód 09010158
Nakladatelství River Publishers
Váha 145
Rozměry 156 x 234 x 6
Darujte tuto knihu ještě dnes
Je to snadné
1 Přidejte knihu do košíku a zvolte doručit jako dárek 2 Obratem vám zašleme poukaz 3 Kniha dorazí na adresu obdarovaného

Přihlášení

Přihlaste se ke svému účtu. Ještě nemáte Libristo účet? Vytvořte si ho nyní!

 
povinné
povinné

Nemáte účet? Získejte výhody Libristo účtu!

Díky Libristo účtu budete mít vše pod kontrolou.

Vytvořit Libristo účet