Amazon cover image
Image from Amazon.com

Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats.

By: Wang, CliffContributor(s): King, StevenMaterial type: TextTextPublication details: Hoboken : John Wiley & Sons, 2007. Description: 1 online resource (706 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780470128572; 0470128577Subject(s): Computer security -- United States | Terrorism -- United States -- Prevention | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Computer security | Terrorism -- Prevention | United StatesGenre/Form: Electronic books. | Electronic books. Additional physical formats: Print version:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25 | D466 2007ebOnline resources: Click here to access online
Contents:
Information Security Research; Contents; Foreword; Acknowledgments; Introduction; Chapter 1: Architecting Information Infrastructures for Security; Chapter 2: At the Edges of the Critical Information Infrastructure; Chapter 3: Software Engineering for Assurance; Chapter 4: Malicious Mobile Code; Chapter 5: Dependable Critical Information Infrastructure for Command and Control.
Summary: After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks; Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years; An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and indust.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Information Security Research; Contents; Foreword; Acknowledgments; Introduction; Chapter 1: Architecting Information Infrastructures for Security; Chapter 2: At the Edges of the Critical Information Infrastructure; Chapter 3: Software Engineering for Assurance; Chapter 4: Malicious Mobile Code; Chapter 5: Dependable Critical Information Infrastructure for Command and Control.

After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks; Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years; An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and indust.

Print version record.

Powered by Koha