Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems (inbunden)
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
96
Utgivningsdatum
2014-01-31
Förlag
River Publishers
Medarbetare
Kotenko, Igor (ed.), Markowsky, George (ed.)
Illustrationer
Illustrations, black and white
Dimensioner
6 x 234 x 156 mm
Vikt
145 g
Antal komponenter
1
Komponenter
Paperback
ISBN
9788793102965

Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems

Technology and Applications

Häftad,  Engelska, 2014-01-31
493
  • Skickas från oss inom 7-10 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems Kan tyvärr inte längre levereras innan julafton.
Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face.
The papers in this issue are:
"The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years.
"Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations.
"Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne c ka, Peter Hanc ek and Matej Kac ic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software.
"Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection.
"Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.
Visa hela texten

Passar bra ihop

  1. Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems
  2. +
  3. Nexus

De som köpt den här boken har ofta också köpt Nexus av Yuval Noah Harari (häftad).

Köp båda 2 för 732 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna