Warehouse Stock Clearance Sale

Grab a bargain today!


Sign Up for Fishpond's Best Deals Delivered to You Every Day
Go
Journal of Cyber Security ­and Mobility 3-1, Special ­Issue on Intelligent Data ­Acquisition and Advanced ­Computing Systems
Technology and Applications
By Igor Kotenko (Edited by), George Markowsky (Edited by)

Rating
Format
Paperback, 96 pages
Published
United States, 31 January 2014

Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face.

The papers in this issue are:

. "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years.

. "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations.

. "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne ¿c ¿ka, Peter Hanác ¿ek and Matej Kac ¿ic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software.

. "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection.

. "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.

Show more

Our Price
£25.19
Ships from Australia Estimated delivery date: 22nd Apr - 30th Apr from Australia
Free Shipping Worldwide

Buy Together
+
Buy together with Intelligent Distributed Computing XIII at a great price!
Buy Together
£241.19

Product Description

Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face.

The papers in this issue are:

. "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years.

. "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations.

. "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne ¿c ¿ka, Peter Hanác ¿ek and Matej Kac ¿ic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software.

. "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection.

. "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.

Show more
Product Details
EAN
9788793102965
ISBN
8793102968
Other Information
Illustrations, black and white
Dimensions
23.4 x 15.6 x 0.5 centimeters (0.14 kg)
Review this Product
Ask a Question About this Product More...
 
Look for similar items by category
Item ships from and is sold by Fishpond Retail Limited.

Back to top
We use essential and some optional cookies to provide you the best shopping experience. Visit our cookies policy page for more information.