• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Cyber Security.

پدید آورنده
John G Voeller

موضوع
Computer networks -- Security measures.,COMPUTERS -- Internet -- Security.,Cyberspace -- Security measures.

رده
QA76
.
9
J646
2014

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025
مشاهده در قفسه مجازی
RIS Bibtex ISO

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1118651685
(Number (ISBN
1118651731
(Number (ISBN
1306373603
(Number (ISBN
9781118651681
(Number (ISBN
9781118651735
(Number (ISBN
9781306373609

NATIONAL BIBLIOGRAPHY NUMBER

Number
b566865

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Cyber Security.
General Material Designation
[Book]
First Statement of Responsibility
John G Voeller

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Wiley
Date of Publication, Distribution, etc.
2014

CONTENTS NOTE

Text of Note
Cover --; Title Page --; Contents --; Preface --; Chapter 1 Cyber Security Metrics and Measure --; 1.1 Introduction --; 1.2 Contrasting Metrics and Measures --; 1.3 Selecting Measures to Support Metrics --; 1.4 Problems with the Accuracy of Measures --; 1.5 Problems with the Selection of Measures --; 1.6 Problems with the Use of Measures --; 1.7 Common Vulnerability Scoring System (CVSS) --; 1.8 Research Directions --; References --; Further Reading --; Chapter 2 Multilevel Security --; 2.1 Introduction --; 2.2 Background --; 2.3 Multilevel Security Policies --; 2.3.1 Confinement --; 2.3.2 Supporting Policies --; 2.3.3 Trusted Subjects --; 2.4 Enforcement of Multilevel Security Policies --; 2.4.1 Design Approaches --; 2.4.2 Threats to MLS Systems --; 2.4.3 Assurance --; 2.4.4 Secure MLS System Development --; 2.4.5 Covert Channels --; 2.4.6 Object Reuse Considerations --; 2.4.7 Target Environment --; 2.4.8 Cascade Problem --; 2.5 Platforms and Architectures for Multilevel Security --; 2.5.1 Use of Applications in MLS Systems --; 2.6 Conclusion --; References --; Chapter 3 Trusted Platforms: The Root of Security --; 3.1 Introduction --; 3.2 The State of Trusted Computing --; 3.2.1 Why Hardware Security? --; 3.2.2 Essentials of Trusted Computing --; 3.2.3 Extension to Storage --; 3.2.4 Biometric Devices as Physical Interface --; 3.2.5 Usage Model --; 3.3 International Scope --; 3.3.1 Integration --; 3.3.2 Trusted Software --; 3.3.3 Networking Trusted Platforms --; 3.4 Expanding the Ring of Trust --; 3.5 Remaining Challenges --; References --; Further Reading --; Chapter 4 Cyber Security Technology Usability and Management --; 4.1 Introduction --; 4.2 Usability and Security: Current Research --; 4.2.1 Improving Existing Security Technologies --; 4.3 Systems Management --; 4.4 Web Security and Phishing. 4.4.1 Designing New Technologies with Usability in Mind --; 4.4.2 Design Guidelines for Building Better Systems --; 4.5 Open Challenges and Take-Aways --; 4.6 Conclusions --; References --; Further Reading --; Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms --; 5.1 Introduction --; 5.2 Scientific Overview --; 5.2.1 Security Properties --; 5.2.2 Constraints on the Design Space --; 5.2.3 Solution Approaches --; 5.2.4 Physical Layer --; 5.2.5 Networking Layers --; 5.2.6 Middleware and Applications --; 5.3 Global Research and Funding --; 5.4 Critical Needs Analysis --; 5.5 Research Directions --; References --; Further Reading --; Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies --; 6.1 Honeypot Essentials --; 6.2 Honeypot Risk --; Legal and Ethical Issues --; 6.3 Honeynet Technologies --; 6.3.1 Generation III Honeynet --; 6.3.2 Global Distributed Honeynet (GDH) --; 6.3.3 Honeyclients --; 6.3.4 Low-Interaction Malware Collectors --; References --; Chapter 7 Security of Web Application and Services and Service-Oriented Architectures --; 7.1 Introduction --; 7.2 SOA Security Challenges --; 7.3 Secure Web Services for SOA --; 7.3.1 Transport-Based Security --; 7.3.2 Message-Based Security --; 7.4 Web Service Security Directions --; 7.4.1 Federation --; 7.4.2 Identity --; 7.5 Summary --; References --; Chapter 8 Industrial Process Control System Security --; 8.1 Introduction --; 8.2 Background --; 8.2.1 The Problem --; 8.2.2 New Threats --; 8.2.3 The Solution --; 8.3 Scientific Study --; 8.3.1 Correlation Benefits --; 8.3.2 Detection --; 8.3.3 Technical Challenges --; 8.3.4 Implementing Defense and Detection in-Depth --; 8.3.5 Test Bed Operating Model --; 8.4 Summary --; 8.5 Next Steps --; 8.6 Conclusion --; Acknowledgments --; References --; Further Reading. Chapter 9 Cyber Security for the Banking and Finance Sector --; 9.1 History of Cooperation --; 9.2 Organizational Roles --; 9.2.1 FSSCC --; 9.2.2 FSSCC Member Organizations --; 9.3 Sample Significant Events --; 9.3.1 Russian Hacker Case --; 9.3.2 Slammer Worm --; 9.3.3 2003 Power Outage --; 9.3.4 Pandemic Planning --; 9.3.5 Operation Firewall --; 9.4 Future Challenges --; Further Reading --; Index.

SUMMARY OR ABSTRACT

Text of Note
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

TOPICAL NAME USED AS SUBJECT

Computer networks -- Security measures.
COMPUTERS -- Internet -- Security.
Cyberspace -- Security measures.

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
Book number
J646
2014

PERSONAL NAME - PRIMARY RESPONSIBILITY

John G Voeller

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

John G Voeller

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival