Secure computer and network systems: modeling analysis and design
Publication details: Chichester John Wiley and Sons 2008Description: xvii, 336 pISBN:- 9780470023242
- 005.8
Item type | Current library | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|
Book | Ahmedabad | 005.8 Y3S3 (Browse shelf(Opens below)) | Available | 167454 |
Browsing Ahmedabad shelves Close shelf browser (Hides shelf browser)
005.8 T6M3 Mechanics of user identification and authentication: fundamentals of identity management | 005.8 V2P7 Practical internet security | 005.8 W4I2 Identity management: a primer | 005.8 Y3S3 Secure computer and network systems: modeling analysis and design | 005.80922 L3H2 Hackers: heroes of the computer revolution | 005.82 B2S3 Secret history: the story of cryptology | 005.82 C8B7 Brute force: cracking the data encryption standard |
Includes bibliographical references and index
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance. This book presents quantitative modeling and analysis techniques to address these numerous challenges in cyber attack prevention and detection for security and QoS, including: 1. the latest research on computer and network behavior under attack and normal use conditions; 2. new design principles and algorithms, which can be used by engineers and practitioners to build secure computer and network systems, enhance security practice and move to providing QoS assurance on the Internet; 3. mathematical and statistical methods for achieving the accuracy and timeliness of cyber attack detection with the lowest computational overhead; 4. guidance on managing admission control, scheduling, reservation and service of computer and network jobs to assure the service stability and end-to-end delay of those jobs even under Denial of Service attacks or abrupt demands. Source: http://search.barnesandnoble.com
There are no comments on this title.