rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781402033803

Cyberspace Security And Defense

by ; ;
  • ISBN13:

    9781402033803

  • ISBN10:

    140203380X

  • Format: Paperback
  • Copyright: 2005-05-30
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $179.00 Save up to $143.36
  • Digital
    $77.22*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security. Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "Should we do something for enhancing our digital assets security", the question is "How to do it".

Table of Contents

Preface ix
Part 1 General Security Issues
IT Security Development Computer-Aided Tool Supporting Design and Evaluation
3(22)
Andrzej Bialas
A Case for Public and Private Review of Developing IT Security Standards
25(18)
Roger Allan Frenc
Timothy Grance
Assuring Critical Information Infrastructure
43(14)
Sokratis K. Katsikas
Systemic Challenges for Critical Information Infrastructure Protection
57(18)
Marcello Masera
Decentralized Energy Supply to Secure Computer Systems
75(26)
Igor Tyukhov
Part 2 Dependability
Safety Analysis Methods---Software Development Questions
101(24)
Tadeusz Cichocki
Trust Case---A Case for Trustworthiness of IT Infrastructures
125(18)
Janusz Gorski
Dependability, Structure, and Infrastructure
143(18)
Brian Randell
Design for Safety and Security of Complex Embedded Systems: A Unified Approach
161(16)
Erwin Schoitsch
Part 3 Networks
Design of Distributed Sensor Networks for Security and Defense
177(16)
Zdravko Karakehayov
A Distributed Approach to the Recognition of Geographically Located IP Devices
193(16)
George Markowsky
Roman Romanyak
Anatoly Sachenko
Situational Awareness and Network Traffic Analysis
209(22)
John McHugh
Carrie Gates
Damon Becknel
Part 4 Early Warning Information Systems and Secure Access Control
Honeynets: Foundations for the Development of Early Warning Information Systems
231(28)
F. Pouget
M. Dacier
V. H. Pham
IRIS Biometrics for Secure Remote Access
259(20)
Andrzej Pacut
Adam Czajka
Przemek Strzelczyk
New Directions in Access Control
279(18)
Pierangela Samarati
Sabrina De Capitani di Vimercati
Part 5 Cryptography
Improved Block Cipher Counter Mode of Operation Schemes
297(18)
Ivan Gorbenko
Sergiy Golovashich
Electronic Signature in Real World
315(8)
Vlasta Joskova
A Note on Two Significant Developments in Cyberspace Security and Defense
323(8)
Janusz S. Kowalik
A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol
331(18)
Bartlomiej Ziolkowski
Janusz Stoklosa
Part 6 Intrusion Detection
An Infrastructure for Distributed Event Acquisition
349(18)
Herve Debar
Benjamin Morin
Vincent Boissee
Didier Guerin
Some Aspects of Neural Network Approach for Intrusion Detection
367
Vladimir Golovko
Pavel Kochurko

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program