Muutke küpsiste eelistusi

E-raamat: New Solutions for Cybersecurity

Edited by (Massachusetts Institute of Technology), Edited by (Massachusetts Institute of Technology), Edited by
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 52,00 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.

Introduction: Cybersecurity and society 1(10)
Howard Shrobe
David Shrier
Alex Pentland
I MANAGEMENT, ORGANIZATIONS & STRATEGY
Chapter 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives
11(70)
Nazli Choucri
Stuart Madnick
Priscilla Koepke
Chapter 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risks-Applied to TJX Cyberattack
81(32)
Hamid Salim
Stuart Madnick
Chapter 3 Measuring Stakeholders' Perceptions of Cybersecurity for Renewable Energy Systems
113(16)
Stuart Madnick
Mohammad S. Jalali
Michael Siegel
Yang Lee
Diane Strong
Richard Wang
Chapter 4 Fixing a Hole: the Labor Market for Bugs
129(34)
Ryan Ellis
Keman Huang
Michael Siegel
Katie Moussouris
James Houghton
II ARCHITECTURE
Chapter 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
163(36)
Robert N. M. Watson
Peter G. Neumann
Simon W. Moore
Chapter 6 Fundamental Trustworthiness Principles
199(40)
Peter G. Neumann
Chapter 7 ISP---Hardware Enforcement of Security Policies
239(28)
Gregory T. Sullivan
Jothy Rosenberg
Howard E. Shrobe
Andre DeHon
Chapter 8 Stealing Reality: When Criminals Become Data Scientists
267(26)
Yaniv Altshuler
Nadav Aharony
Yuval Elovici
Alex Pentland
Manuel Cebrian
Chapter 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism
293(22)
Hamed Okhravi
Howard Shrobe
III SYSTEMS
Chapter 10 Who's Afraid of the Dark Web?
315(36)
Harry Halpin
Chapter 11 Social Physics and Cybercrime
351(14)
Yaniv Altshuler
Alex Pentland
Chapter 12 Behavioral Biometrics
365(14)
David Shrier
Thomas Hardjono
Alex Pentland
Chapter 13 Data Security and Privacy in the Age of IoT
379(24)
Thomas Hardjono
Alex Pentland
David Shrier
Chapter 14 Owner Centric Access Management for IoT Data. Incentivizing Data Owners to Share Data into the Data Markets
403(22)
Thomas Hardjono
Chapter 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
425(32)
Guy Zyskind
Alex Pentland
Chapter 16 The Trust::Data Framework as a Solution to the Cybersecurity Challenge
457(20)
Thomas Hardjono
David Shrier
Alex Pentland
Conclusion 477(8)
Contributor Biographies 485