Muutke küpsiste eelistusi

New Solutions for Cybersecurity [Pehme köide]

Edited by (Massachusetts Institute of Technology), Edited by (Massachusetts Institute of Technology), Edited by
  • Formaat: Paperback / softback, 504 pages, kõrgus x laius x paksus: 203x137x25 mm, 56 b&w illus., 25 tables
  • Sari: New Solutions for Cybersecurity
  • Ilmumisaeg: 26-Jan-2018
  • Kirjastus: MIT Press
  • ISBN-10: 0262535378
  • ISBN-13: 9780262535373
Teised raamatud teemal:
  • Pehme köide
  • Hind: 37,25 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 504 pages, kõrgus x laius x paksus: 203x137x25 mm, 56 b&w illus., 25 tables
  • Sari: New Solutions for Cybersecurity
  • Ilmumisaeg: 26-Jan-2018
  • Kirjastus: MIT Press
  • ISBN-10: 0262535378
  • ISBN-13: 9780262535373
Teised raamatud teemal:
Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.

Introduction: Cybersecurity and society 1(10)
Howard Shrobe
David Shrier
Alex Pentland
I MANAGEMENT, ORGANIZATIONS & STRATEGY
Chapter 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives
11(70)
Nazli Choucri
Stuart Madnick
Priscilla Koepke
Chapter 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risks-Applied to TJX Cyberattack
81(32)
Hamid Salim
Stuart Madnick
Chapter 3 Measuring Stakeholders' Perceptions of Cybersecurity for Renewable Energy Systems
113(16)
Stuart Madnick
Mohammad S. Jalali
Michael Siegel
Yang Lee
Diane Strong
Richard Wang
Chapter 4 Fixing a Hole: the Labor Market for Bugs
129(34)
Ryan Ellis
Keman Huang
Michael Siegel
Katie Moussouris
James Houghton
II ARCHITECTURE
Chapter 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
163(36)
Robert N. M. Watson
Peter G. Neumann
Simon W. Moore
Chapter 6 Fundamental Trustworthiness Principles
199(40)
Peter G. Neumann
Chapter 7 ISP---Hardware Enforcement of Security Policies
239(28)
Gregory T. Sullivan
Jothy Rosenberg
Howard E. Shrobe
Andre DeHon
Chapter 8 Stealing Reality: When Criminals Become Data Scientists
267(26)
Yaniv Altshuler
Nadav Aharony
Yuval Elovici
Alex Pentland
Manuel Cebrian
Chapter 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism
293(22)
Hamed Okhravi
Howard Shrobe
III SYSTEMS
Chapter 10 Who's Afraid of the Dark Web?
315(36)
Harry Halpin
Chapter 11 Social Physics and Cybercrime
351(14)
Yaniv Altshuler
Alex Pentland
Chapter 12 Behavioral Biometrics
365(14)
David Shrier
Thomas Hardjono
Alex Pentland
Chapter 13 Data Security and Privacy in the Age of IoT
379(24)
Thomas Hardjono
Alex Pentland
David Shrier
Chapter 14 Owner Centric Access Management for IoT Data. Incentivizing Data Owners to Share Data into the Data Markets
403(22)
Thomas Hardjono
Chapter 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
425(32)
Guy Zyskind
Alex Pentland
Chapter 16 The Trust::Data Framework as a Solution to the Cybersecurity Challenge
457(20)
Thomas Hardjono
David Shrier
Alex Pentland
Conclusion 477(8)
Contributor Biographies 485