rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780824759391

Statistical Methods in Computer Security

by ;
  • ISBN13:

    9780824759391

  • ISBN10:

    0824759397

  • Format: Hardcover
  • Copyright: 2004-12-28
  • Publisher: CRC Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $170.00 Save up to $127.76
  • Rent Book $114.75
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Statistical Methods in Computer Security [ISBN: 9780824759391] for the semester, quarter, and short term or search our site for other textbooks by Chen; William W.S.. Renting a textbook can save you up to 90% from the cost of buying.

Summary

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.

Table of Contents

Preface iii
Contributors xi
Development of Organizational Internet Security Policy: A Holistic Approach
1(22)
Sharman Lichtenstein
Introduction
2(3)
Organizational Internet Risks
5(4)
Holistic Factors in Internet Security Policy
9(4)
Framework for Developing Organizational Internet Security Policy
13(3)
Internet Security Policy Content Model
16(1)
Research Findings and Conclusion
16(7)
Managing Software Security Risks: Buffer Overflows and Beyond
23(10)
Gary McGraw
Software Security
23(1)
Understanding the Problem
24(6)
A Call to Arms
30(3)
Experiments in Wireless Internet Security
33(16)
Vipul Gupta
Sumit Gupta
Introduction
34(3)
Secure Sockets Layer (SSL)
37(3)
KSSL and KSecurity
40(3)
Secure Mobile Enterprise Access
43(1)
Technology Trends
44(1)
Conclusions and Future Work
45(4)
The Neverending Saga of Internet Security: Why? How? and What to Do Next?
49(8)
Eddie Rabinovitch
Secure Compartmented Data Access over an Untrusted Network Using a Cots-Based Architecture
57(14)
Paul C. Clark
Marion C. Meissner
Karen O. Vance
Introduction
58(2)
Security Architecture
60(4)
Security Issues and Assumptions
64(2)
Comparison with Related Work
66(2)
Future Directions
68(1)
Conclusion
69(2)
Internet Security
71(30)
Matt Bishop
Steven Cheung
Jeremy Frank
James Hoagland
Steven Samorodin
Chris Wee
Introduction
71(3)
Protection
74(3)
Trust and Vulnerabilities
77(8)
Audit
85(3)
Intrusion Detection
88(4)
Response
92(1)
Assessment
93(3)
Recovery
96(1)
Conclusion: What of the Future
97(4)
Computer Security: The Good, the Bad, and the Ugly
101(8)
Catherine Meadows
Introduction
102(1)
Bad
103(1)
Ugly
104(1)
Good
105(4)
Architecture and Applications for a Distributed Embedded Firewall
109(22)
Charles Payne
Tom Markham
Introduction
110(2)
Objectives for EFW
112(6)
Implementing EFW
118(3)
Managing EFW
121(2)
EFW Applications
123(4)
Future Work
127(1)
Summary
127(4)
Using Operating System Wrappers to Increase the Resiliency of Commercial Firewalls
131(26)
Jeremy Epstein
Linda Thomas
Eric Monteith
Introduction
132(1)
Motivation
133(1)
Wrappers Synopsis
134(4)
Gauntlet Wrappers Using NAI Labs Wrappers
138(8)
Wrapping Nonsource Firewalls Using NAI Labs Wrappers
146(5)
Wrapping Gauntlet Using ISI Wrappers
151(2)
Current Status and Future Directions
153(2)
Conclusion
155(2)
A Susceptible-Infected-Susceptible Model with Reintroduction for Computer Virus Epidemies
157(12)
John C. Wierman
Introduction
158(1)
The SIS Model
159(1)
Computer Virus SIS Modeling
160(2)
Analysis and Results
162(3)
Discussion
165(4)
Man vs. Machine---A Study of the Ability of Statistical Methodologies to Discern Human Generated ssh Traffic from Machine Generated scp Traffic
169(14)
J.L. Solka
M.L. Adams
E.J. Wegman
Introduction
170(1)
Background
171(1)
Results
172(7)
Conclusions
179(4)
Passive Detection of Denial of Service Attacks on the Internet
183(30)
David J. Marchette
Introduction
183(3)
Analysis
186(3)
Experimental Results
189(20)
Conclusions
209(4)
On the Extinction of the S-I-S Stochastic Logistic Epidemic
213(16)
Richard J. Kryscio
Claude Lefevre
Introduction
214(2)
On the Mean Time Until Extinction
216(4)
On the Quasi-Stationary Distribution
220(9)
Secure Introduction of One-way Functions
229(20)
Dennis Volpano
Introduction
229(4)
The Language and Semantics
233(4)
The Type System
237(1)
The Reduction
238(6)
Application to Password Systems
244(3)
Conclusion
247(2)
Policy-Based Authentication and Authorization
249(16)
Jeff Hayes
Overview
249(1)
Authentication
250(4)
Authorization
254(5)
Policy Management
259(2)
Policy Security
261(1)
Conclusion
262(3)
The Evolution of Viruses and Worms
265(22)
Thomas M. Chen
Jean-Marc Robert
Introduction
266(2)
First Wave: Early Viruses and Worms
268(2)
Second Wave: Polymorphism and Toolkits
270(1)
Third Wave: Mass E-Mailers
271(3)
Fourth Wave: Modern Worms
274(5)
Current Developments
279(3)
Conclusions
282(5)
Infrastructure Web: Distributed Monitoring and Managing Critical Infrastructures
287(22)
Guofei Jiang
George Cybenko
Dennis McGrath
Introduction
288(2)
The Infrastructure Protection Process
290(7)
Architecture
297(8)
Related Work
305(1)
Summary
306(3)
Firewalls: An Expert Roundtable
309(18)
James P. Anderson
Sheila Brand
Li Gong
Thomas Haigh
What are Firewalls?
310(17)
A New Model for Probabilistic Information Retrieval on the Web
327(22)
Gabriel Mateeseu
Masha Sosonkina
Paul Thompson
Introduction
328(1)
Background
329(1)
Related Research
330(1)
The Combination of Expert Opinion Model
331(2)
Relevance Feedback
333(1)
Probability Distributions in the Combination of Expert Opinion
334(1)
Computing the Mean and Standard Deviation of the Transformed Beta Distribution
335(3)
Discussion
338(2)
Conclusion
340(9)
Index 349

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program