did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780849322723

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

by ;
  • ISBN13:

    9780849322723

  • ISBN10:

    0849322723

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2004-11-29
  • Publisher: CRC Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $170.00 Save up to $129.80
  • Rent Book $107.10
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms.Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.

Table of Contents

Overview
1(4)
Network Security Problems
5(30)
Vulnerabilities
7(4)
Attacks
11(2)
Threat Modeling
13(1)
Physical Security
14(2)
Social Engineering
16(1)
Privacy
17(1)
Fraud
17(1)
Scavenging
18(1)
Trojan Horses
19(1)
Trapdoors
19(1)
Viruses
20(2)
Worms
22(2)
Reverse Engineering
24(1)
Covert Communications Channels
24(2)
Buffer Overflow and Stack Smashing
26(2)
Denial of Service
28(1)
Distributed Denial of Service
29(1)
Man-in-the-Middle Attacks
30(1)
Replay Attacks
30(1)
Cryptanalysis
30(1)
DNS and BGP Vulnerabilities
31(2)
Exercises
33(2)
Current Security Solutions
35(22)
Audits
35(1)
Encryption
36(2)
Steganography
38(1)
Obfuscation
38(2)
Public Key Infrastructure
40(1)
Code Signing
41(1)
SSL, TLS, and SSH
42(1)
Formal Methods
42(1)
Virus Scanners
43(1)
Attack Graphs
44(2)
Security Automata
46(1)
Sandboxing
47(1)
Firewalls
47(1)
Red/Black Separation
48(1)
Proof Carrying Code
48(1)
Secure Hardware
49(1)
Dependability, Safety, Liveness
50(3)
Quality of Service
53(1)
Artificial Immune Systems
54(1)
Exercises
55(2)
Disruptive Technologies
57(16)
Mobile Code
58(3)
Peer-To-Peer Networks
61(2)
Field Programmable Gate Arrays
63(1)
Adaptation
64(7)
Continuous Models
67(2)
Discrete Models
69(2)
Conclusion
71(1)
Exercises
71(2)
Understanding Networks
73(22)
Internet Protocol Background
74(3)
Networks of Embedded Control Systems
77(4)
Sensor Networks
77(3)
BACnet
80(1)
Network Topology
81(4)
Erdos-Renyi Random Graph
82(2)
Small World Graphs
84(1)
Scale-Free Graphs
85(3)
Ad Hoc Wireless Networks
86(1)
Cell Phone Grids
87(1)
Traffic Flows
88(5)
Conclusion
93(1)
Exercises
94(1)
Understanding Mobile Code
95(60)
Existing Paradigms
95(2)
Existing Implementations
97(1)
Theoretical Model
98(9)
Simulator for Model
107(2)
Models of Paradigms
109(7)
Client-Server
109(4)
Remote Evaluation
113(1)
Code on Demand
114(1)
Process Migration
114(1)
Mobile Agents
115(1)
Active Networks
115(1)
Simulation Studies of Models
116(9)
Client-Server
117(2)
Remote Evaluation
119(1)
Code on Demand
120(2)
Process Migration
122(2)
Mobile Agents
124(1)
Models of Networking Pathologies
125(2)
Worm
126(1)
Virus
126(1)
Distributed Denial of Service
127(1)
Simulation Studies of Pathologies
127(2)
Worm
127(1)
Distributed Denial of Service
128(1)
Comparison of Network Simulations
129(11)
Cantor UDP Model
131(2)
Cantor TCP Model
133(1)
Simulation Comparisons
134(6)
Taxonomies of Mobile Code and Security
140(5)
Mobile Code Daemon Implementation
145(7)
Conclusion
152(1)
Exercises
153(2)
Protecting Mobile Code
155(26)
Control Flow Modification
156(2)
Bytecode Modification
158(3)
Protocol for Exchanging Bytecode Tables
161(2)
Entropy Maximization of Bytecode Mappings
163(10)
Bytecode Steganography
173(4)
Use of Secure Coprocessors
177(1)
Conclusion
178(1)
Exercises
179(2)
Protecting Mobile Code Platforms
181(40)
Smart Card Applications
184(1)
Building Control Systems
185(2)
FPGA Cryptography Engine
187(18)
Existing Implementations
189(3)
Parallel Encryption Engine for Des
192(3)
Parallel Encryption Engine for Triple Des
195(2)
Parallel Encryption Engine for Aes
197(2)
Secure Hash Function Engine
199(2)
Asic Implementations
201(1)
Comparison of Parallel and Pipelined Aes
202(3)
Differential Power Analysis
205(15)
Secure Instruction Set
207(2)
Secure Instruction Implementation
209(3)
Des Results
212(4)
Aes Implementation
216(2)
Aes Evaluation
218(1)
Parallel Cryptography Engine Power Analysis
219(1)
Conclusion
220(1)
Exercises
220(1)
Maintaining Trust on the Network
221(14)
Assumptions and Primitives
224(1)
Mobile Code Verification
225(2)
Host Verification
227(4)
Multi-Level Security
231(1)
Conclusions
232(1)
Exercises
233(2)
Designing Peer-to-Peer Systems
235(48)
Graph Theory Background
236(1)
Random Graph Background
237(9)
Erdos-Renyi
237(1)
Small World
238(2)
Cell Phone Grids
240(1)
Ad Hoc
241(2)
Scale-Free
243(3)
Number of Hops Between Nodes
246(7)
Empirical Estimate
247(4)
Analytical Estimate
251(2)
Dependability of Peer-to-Peer Systems
253(5)
Vulnerability to Attack
258(1)
Quality of Service of Peer-to-Peer Systems
259(10)
Analytical Expression for Delay
261(2)
Analytical Expression for Jitter
263(2)
Analytical Expression for Loss Probability
265(1)
Queuing Model
266(2)
Comparison with Simulations
268(1)
Correct Number of Indexes
269(3)
Key Management
272(8)
Conclusion
280(1)
Exercises
281(2)
Emergent Routing
283(32)
Ad Hoc Data Routing Background
283(4)
Spin Glass Routing
287(3)
Multifractal Routing
290(3)
Pheromone Routing
293(10)
Comparison of Routing Algorithms
303(2)
Epidemic Resource Discovery
305(8)
Conclusion
313(1)
Exercises
314(1)
Denial of Service Countermeasures
315(36)
Denial of Service (DoS) Background
315(3)
Traffic Flow Measures
318(1)
Attack Detection
319(5)
Verification of Detector
324(19)
Game Theory Analysis
343(2)
Network Structure Vulnerabilities
345(5)
Conclusion
350(1)
Exercises
350(1)
Conclusion
351(4)
References 355(18)
Index 373

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program