Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats.
Material type:
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
e-Library
Electronic Book@IST |
EBook | Available |
Information Security Research; Contents; Foreword; Acknowledgments; Introduction; Chapter 1: Architecting Information Infrastructures for Security; Chapter 2: At the Edges of the Critical Information Infrastructure; Chapter 3: Software Engineering for Assurance; Chapter 4: Malicious Mobile Code; Chapter 5: Dependable Critical Information Infrastructure for Command and Control.
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks; Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years; An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and indust.
Print version record.