rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780471787563

Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats

by ; ; ; ; ; ; ; ; ;
  • ISBN13:

    9780471787563

  • ISBN10:

    0471787566

  • Format: Hardcover
  • Copyright: 2007-07-01
  • Publisher: Wiley
  • Purchase Benefits
List Price: $60.00 Save up to $1.21
  • Digital
    $58.79
    Add to Cart

    DURATION
    PRICE

Summary

After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and industry network needs Discusses software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies

Author Biography

In 2001, the Director of Defense research and Engineering in the Office of the Secretary of Defense initiated an $80 million, five-year research program at U.S. universities in critical infrastructure protection and high confidence adaptable software. Managed by the Department of Defense science offices, these projects produced the results summarized here.

Table of Contents

Foreword
Acknowledgements
Introduction
Architecting Information Infrastructures for Security
Architectures for Secure and Robust Distributed Infrastructures
A complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure
Anomaly and Misuse Detection in Network Traffic Streams-Checking and Machine Learning Approaches
Distributed Systems Security via Logical Framework
Distributed Immune Systems for Wireless Networks Information Assurance
Hi-DRA High-Speed, Wide-Area Network Detection, Response, and Analysis
At the Edges of the Critical Information Infrastructure
Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security
Software Model Checking for Embedded Systems
Advanced tool Integration for Embedded System Assurance
Verification Tools for Embedded Systems
Software Engineering for Assurance
Static Analysis to Enhance toe Power of Model Checking for Concurrent Software
Protecting COTS from the Inside
RAPIDware: Component-Based Development of Adaptive and Dependable Middleware
Generating Efficient Trust Management Software from Policies
Modeling and Simulation Environment for Critical Information Protection
Malicious Mobile Code
Language-Based Security for Malicious Mobile Code
Model-Carrying Code: A New Approach to Mobile-Code Security
Neutralizing Malicious Mobile Code
Dependable Critical Information Infrastructure for Command and Control
5.1 Trustworthy Infrastructure, Mechanisms, and Experimentation for Diffuse Computing
5.2 Adaptable Situation-Aware Secure Services-Based Systems
5.3 Detecting Deception in the Military Infosphere: Improving and Integrating Human Detection Capabilities with Automated Tools
5.4 Vulnerability Assessment Tools for Complex Information Networks
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program