- 5 Résultats
prix le plus bas: € 8,00, prix le plus élevé: € 48,45, prix moyen: € 36,78
1
Department of Defense Sponsored Information Security Research - Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs
Commander
sur lehmanns.de
€ 43,99
CommanderLien sponsorisé
Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs:

Department of Defense Sponsored Information Security Research - Première édition

2007, ISBN: 9780470128572

New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, * After September 11th, the Department of Defense (DoD) undertooka massive and classified resea… Plus…

Frais d'envoiDoes not ship to your country., Livraison non-comprise
2
Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats - Cliff Wang
Commander
sur hive.co.uk
£ 33,99
(environ € 39,45)
CommanderLien sponsorisé

Cliff Wang:

Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats - nouveau livre

ISBN: 9780470128572

After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret infor… Plus…

No. 9780470128572. Frais d'envoiInstock, Despatched same working day before 3pm, plus shipping costs., Livraison non-comprise
3
Department of Defense Sponsored Information Security Research - Cliff Wang, Steven King, Ralph Wachter, Robert Herklotz, Chris Arney, Gary Toth, David Hislop, Sharon Heise, Todd Combs
Commander
sur Perlego.com
€ 8,00 (Loyer/mois)
Envoi: € 0,001
Commander (Loyer/mois)Lien sponsorisé
Cliff Wang, Steven King, Ralph Wachter, Robert Herklotz, Chris Arney, Gary Toth, David Hislop, Sharon Heise, Todd Combs:
Department of Defense Sponsored Information Security Research (Loyer mensuel. Abonnement annuel)

ISBN: 9780470128572

Wiley Computer Networking extensive; pages; years; summarize; research; traditional; methods; critical; longer; infrastructures; adequate; information; department; extensive university re… Plus…

Frais d'envoi EUR 0.00
4
Department of Defense Sponsored Information Security Research - Cliff Wang; Chris Arney; Todd Combs; Sharon Heise; Robert Herklotz; David Hislop; Steven King; Gary Toth; Ralph Wachter
Commander
sur lehmanns.de
€ 43,99
Envoi: € 0,001
CommanderLien sponsorisé
Cliff Wang; Chris Arney; Todd Combs; Sharon Heise; Robert Herklotz; David Hislop; Steven King; Gary Toth; Ralph Wachter:
Department of Defense Sponsored Information Security Research - Première édition

2007, ISBN: 9780470128572

New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, [PU: Wiley], Wiley, 2007

Frais d'envoiDownload sofort lieferbar. (EUR 0.00)
5
Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats
Commander
sur amazon.co.uk
£ 41,74
(environ € 48,45)
Envoi: € 8,101
CommanderLien sponsorisé
Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats - nouveau livre

ISBN: 9780470128572

Digital Download, Produktgruppe: Digital Book Service, Subjects, Books, [PU: Wiley]

Frais d'envoiIn stock. Lieferung von Amazon. (EUR 8.10) Amazon.co.uk

1Comme certaines plateformes ne transmettent pas les conditions d'expédition et que celles-ci peuvent dépendre du pays de livraison, du prix d'achat, du poids et de la taille de l'article, d'une éventuelle adhésion de la plateforme, d'une livraison directe par la plateforme ou via un prestataire tiers (Marketplace), etc. il est possible que les frais de livraison indiqués par eurolivre ne correspondent pas à ceux de la plateforme qui propose l'article.

Données bibliographiques du meilleur livre correspondant

Détails sur le livre

Informations détaillées sur le livre - Department of Defense Sponsored Information Security Research


EAN (ISBN-13): 9780470128572
ISBN (ISBN-10): 0470128577
Date de parution: 2007
Editeur: Wiley

Livre dans la base de données depuis 2009-01-01T02:29:11+01:00 (Paris)
Page de détail modifiée en dernier sur 2024-02-16T11:35:05+01:00 (Paris)
ISBN/EAN: 0470128577

ISBN - Autres types d'écriture:
0-470-12857-7, 978-0-470-12857-2
Autres types d'écriture et termes associés:
Auteur du livre: wachter, david king, toth, king steven, ralph röber, hislop, sharon, herklotz, robert wang, cliff david, langley
Titre du livre: information security, department


Données de l'éditeur

Auteur: Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs
Titre: Department of Defense Sponsored Information Security Research - New Methods for Protecting Against Cyber Threats
Editeur: Wiley; John Wiley & Sons
688 Pages
Date de parution: 2008-02-13
Langue: Anglais
43,99 € (DE)
Not available (reason unspecified)

EA; E107; E-Book; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Computernetzwerke und maschinelle Kommunikation; Computer Science; Informatik; Networking; Netzwerk; Netzwerke; Netzwerke; BB

Foreword. Acknowledgements. Introduction (Steven King). Chapter 1. Architecting Information Infrastructures forSecurity (Cliff Wang). 1.1 Architectures for Secure and Robust DistributedInfrastructures. 1.2 A complex Adaptive System Approach to QoS Assurance andStateful Resource Management for Dependable InformationInfrastructure. 1.3 Anomaly and Misuse Detection in Network TrafficStreams-Checking and Machine Learning Approaches. 1.4 Distributed Systems Security via Logical Framework. 1.5 Distributed Immune Systems for Wireless Networks InformationAssurance. 1.6 Hi-DRA High-Speed, Wide-Area Network Detection, Response,and Analysis. Chapter 2. At the Edges of the Critical InformationInfrastructure (David Hislop, Todd Combs). 2.1 Enabling Dynamic Security Management of Networked Systemsvia Device-Embedded Security. 2.2 Software Model Checking for Embedded Systems. 2.3 Advanced tool Integration for Embedded System Assurance. 2.4 Verification Tools for Embedded Systems. Chapter 3. Software Engineering for Assurance (RalphWachter, Gary Toth). 3.1 Static Analysis to Enhance toe Power of Model Checking forConcurrent Software. 3.2 Protecting COTS from the Inside. 3.3 RAPIDware: Component-Based Development of Adaptive andDependable Middleware. 3.4 Generating Efficient Trust Management Software fromPolicies. 3.5 Modeling and Simulation Environment for Critical InformationProtection. Chapter 4. Malicious Mobile Code (Ralph Wachter, GaryToth). 4.1 Language-Based Security for Malicious Mobile Code. 4.2 Model-Carrying Code: A New Approach to Mobile-CodeSecurity. 4.3 Neutralizing Malicious Mobile Code. Chapter 5. Dependable Critical Information Infrastructure forCommand and Control (Robert Herklotz, Chris Arney). 5.1 Trustworthy Infrastructure, Mechanisms, and Experimentationfor Diffuse Computing. 5.2 Adaptable Situation-Aware Secure Services-Based Systems. 5.3 Detecting Deception in the Military Infosphere: Improvingand Integrating Human Detection Capabilities with AutomatedTools. 5.4 Vulnerability Assessment Tools for Complex InformationNetworks.

Autres livres qui pourraient ressembler au livre recherché:

Dernier livre similaire:
9780471787563 Department of Defense Information Security Report (Department of Defense; Bollinger, Terry)


< pour archiver...