Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats.

By: Wang, Cliff
Contributor(s): King, Steven
Material type: TextTextPublisher: Hoboken : John Wiley & Sons, 2007Description: 1 online resource (706 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780470128572; 0470128577Subject(s): Computer security -- United States | Terrorism -- United States -- Prevention | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Computer security | Terrorism -- Prevention | United StatesGenre/Form: Electronic books. | Electronic books. Additional physical formats: Print version:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25 | D466 2007ebOnline resources: Click here to access online
Contents:
Information Security Research; Contents; Foreword; Acknowledgments; Introduction; Chapter 1: Architecting Information Infrastructures for Security; Chapter 2: At the Edges of the Critical Information Infrastructure; Chapter 3: Software Engineering for Assurance; Chapter 4: Malicious Mobile Code; Chapter 5: Dependable Critical Information Infrastructure for Command and Control.
Summary: After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks; Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years; An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and indust.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Information Security Research; Contents; Foreword; Acknowledgments; Introduction; Chapter 1: Architecting Information Infrastructures for Security; Chapter 2: At the Edges of the Critical Information Infrastructure; Chapter 3: Software Engineering for Assurance; Chapter 4: Malicious Mobile Code; Chapter 5: Dependable Critical Information Infrastructure for Command and Control.

After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks; Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years; An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and indust.

Print version record.

There are no comments for this item.

to post a comment.

Powered by Koha