rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781402033797

Cyberspace Security And Defense

by ; ;
  • ISBN13:

    9781402033797

  • ISBN10:

    1402033796

  • Format: Hardcover
  • Copyright: 2005-06-13
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $179.99 Save up to $144.35
  • Digital
    $77.22*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Cyberspace security is a critical subject of our times. On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security. Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "Should we do something for enhancing our digital assets security", the question is "How to do it".

Table of Contents

Preface ix
Part 1 General Security Issues
IT Security Development Computer-Aided Tool Supporting Design and Evaluation
3(22)
Andrzej Bialas
A Case for Public and Private Review of Developing IT Security Standards
25(18)
Roger Allan Frenc, Timothy Grance
Assuring Critical Information Infrastructure
43(14)
Sokratis K. Katsikas
Systemic Challenges for Critical Information Infrastructure Protection
57(18)
Marcello Masera
Decentralized Energy Supply to Secure Computer Systems
75(26)
Igor Tyukhov
Part 2 Dependability
Safety Analysis Methods—Software Development Questions
101(24)
Tadeusz Cichocki
Trust Case—A Case for Trustworthiness of IT Infrastructures
125(18)
Janusz Górski
Dependability, Structure, and Infrastructure
143(18)
Brian Randell
Design for Safety and Security of Complex Embedded Systems: A Unified Approach
161(16)
Erwin Schoitsch
Part 3 Networks
Design of Distributed Sensor Networks for Security and Defense
177(16)
Zdravko Karakehayov
A Distributed Approach to the Recognition of Geographically Located IP Devices
193(16)
George Markowsky, Roman Romanyak, and Anatoly Sachenko
Situational Awareness and Network Traffic Analysis
209(22)
John McHugh, Carrie Gates, and Damon Becknel
Part 4 Early Warning Information Systems and Secure Access Control
Honeynets: Foundations for the Development of Early Warning Information Systems
231(28)
F. Pouget, M Dacier, and V.H. Pham
IRIS Biometrics for Secure Remote Access
259(20)
Andrzej Pacut, Adam Czajka, and Przemek Strzelczyk
New Directions in Access Control
279(18)
Pierangela Samarati and Sabrina De Capitani di Vimercati
Part 5 Cryptography
Improved Block Cipher Counter Mode of Operation Schemes
297(18)
Ivan Gorbenko and Sergiy Golovashich
Electronic Signature in Real World
315(8)
Vlasta Jošková
A Note on Two Significant Developments in Cyberspace Security and Defense
323(8)
Janusz S. Kowalik
A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol
331(18)
Bartlomiej Ziólkowski and Janusz Stoklosa
Part 6 Intrusion Detection
An Infrastructure for Distributed Event Acquisition
349(18)
Hervé Debar, Benjamin Morin, Vincent Boissée, and Didier Guérin
Some Aspects of Neural Network Approach for Intrusion Detection
367
Vladimir Golovko and Pavel Kochurko

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program