Foreword | |
Acknowledgements | |
Introduction | |
Architecting Information Infrastructures for Security | |
Architectures for Secure and Robust Distributed Infrastructures | |
A complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure | |
Anomaly and Misuse Detection in Network Traffic Streams-Checking and Machine Learning Approaches | |
Distributed Systems Security via Logical Framework | |
Distributed Immune Systems for Wireless Networks Information Assurance | |
Hi-DRA High-Speed, Wide-Area Network Detection, Response, and Analysis | |
At the Edges of the Critical Information Infrastructure | |
Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security | |
Software Model Checking for Embedded Systems | |
Advanced tool Integration for Embedded System Assurance | |
Verification Tools for Embedded Systems | |
Software Engineering for Assurance | |
Static Analysis to Enhance toe Power of Model Checking for Concurrent Software | |
Protecting COTS from the Inside | |
RAPIDware: Component-Based Development of Adaptive and Dependable Middleware | |
Generating Efficient Trust Management Software from Policies | |
Modeling and Simulation Environment for Critical Information Protection | |
Malicious Mobile Code | |
Language-Based Security for Malicious Mobile Code | |
Model-Carrying Code: A New Approach to Mobile-Code Security | |
Neutralizing Malicious Mobile Code | |
Dependable Critical Information Infrastructure for Command and Control | |
5.1 Trustworthy Infrastructure, Mechanisms, and Experimentation for Diffuse Computing | |
5.2 Adaptable Situation-Aware Secure Services-Based Systems | |
5.3 Detecting Deception in the Military Infosphere: Improving and Integrating Human Detection Capabilities with Automated Tools | |
5.4 Vulnerability Assessment Tools for Complex Information Networks | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.