Doprava zdarma se Zásilkovnou nad 1 499 Kč
PPL Parcel Shop 54 Balík do ruky 74 Balíkovna 49 PPL 99 Zásilkovna 54

Jazyk AngličtinaAngličtina
Kniha Pevná
Kniha Moving Target Defense II Sushil Jajodia
Libristo kód: 01428279
Nakladatelství Springer-Verlag New York Inc., září 2012
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security... Celý popis
? points 331 b
3 313
Skladem u dodavatele v malém množství Odesíláme za 14-18 dnů

30 dní na vrácení zboží


Mohlo by vás také zajímat


Marchen Gebrüder Grimm / Brožovaná
common.buy 250
Žena a spása světa Pavel Evdokimov / Pevná
common.buy 302
Zez Confrey at the Piano Zez Confrey / Brožovaná
common.buy 494
Keywords in News and Journalism Studies Barbie Zelizer / Brožovaná
common.buy 948
Love and Death Among Pigeons Lawrence a Wood MD / Brožovaná
common.buy 547
Magnetic Resonance Elastography Sudhakar K. Venkatesh / Pevná
common.buy 3 313
Managing Stress Sumita Roy / Brožovaná
common.buy 177
Připravujeme
Nice Weather Frederick Seidel / Pevná
common.buy 463
Runaways Philippe Onagre / Brožovaná
common.buy 365
Gesellschaftslehre Eckart Pankoke / Pevná
common.buy 2 183
Nursery Rhymes Claud Lovat Fraser / Pevná
common.buy 786
Trump and the Jews David Rubin / Pevná
common.buy 684
Service Parts Management Nezih Altay / Pevná
common.buy 5 094

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. §Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. §Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Darujte tuto knihu ještě dnes
Je to snadné
1 Přidejte knihu do košíku a zvolte doručit jako dárek 2 Obratem vám zašleme poukaz 3 Kniha dorazí na adresu obdarovaného

Přihlášení

Přihlaste se ke svému účtu. Ještě nemáte Libristo účet? Vytvořte si ho nyní!

 
povinné
povinné

Nemáte účet? Získejte výhody Libristo účtu!

Díky Libristo účtu budete mít vše pod kontrolou.

Vytvořit Libristo účet