Muutke küpsiste eelistusi

E-raamat: Situational Awareness in Computer Network Defense: Principles, Methods and Applications

Edited by , Edited by
  • Formaat: PDF+DRM
  • Ilmumisaeg: 31-Jan-2012
  • Kirjastus: Idea Group,U.S.
  • Keel: eng
  • ISBN-13: 9781466601055
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 240,82 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 31-Jan-2012
  • Kirjastus: Idea Group,U.S.
  • Keel: eng
  • ISBN-13: 9781466601055
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"This book provides academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations for situational awareness in computer networks"--Provided by publisher.

This collection of nineteen articles on information security showcases current scholarship in computer and network security with a focus on the development of situationally aware systems and practices. The volume is divided into sections covering principles of situational awareness and network defense, security methods, and situationally aware applications, and individual essays address topics such as designing information systems for situational awareness, sensor fusion for security incident analysis, en-route filtering against false data injection attacks in wireless networks, and tools and metrics for the optimization of enterprise network defense systems. Chapters include abstracts, illustrations, notes, and references and a volume-wide compilation of reading resources is provided. Contributors are academics in computer science from US, European, and Indian institutions. Annotation ©2012 Book News, Inc., Portland, OR (booknews.com)
Preface xvi
Section 1 Principles of SA CND
Chapter 1 Review of Situational Awareness for Computer Network Defense
1(9)
Cyril Onwubiko
Thomas John Owens
Chapter 2 The Contributions of Information Security Culture and Human Relations to the Improvement of Situational Awareness
10(19)
Janne Merete Hagen
Chapter 3 Cyber Command and Control: A Military Doctrinal Prospective on Collaborative Situation Awareness for Decision Making
29(19)
Michael E. Ruiz
Richard Redmond
Chapter 4 A Proactive Defense Strategy to Enhance Situational Awareness in Computer Network Security
48(23)
Yi Luo
Ferenc Szidarovszky
Chapter 5 An Alternative Framework for Research on Situational Awareness in Computer Network Defense
71(15)
Eric McMillan
Michael Tyworth
Chapter 6 Information Security for Situational Awareness in Computer Network Defense
86(18)
Uri Blumenthal
Joshua Haines
William Streilein
Gerald O'Leary
Chapter 7 Designing Information Systems and Network Components for Situational Awareness
104(21)
Cyril Onwubiko
Section 2 Methods in SA CND
Chapter 8 Cyber Situation Awareness through Instance-Based Learning: Modeling the Security Analyst in a Cyber-Attack Scenario
125(16)
Varun Dutt
Cleotilde Gonzalez
Chapter 9 Information Data Fusion and Computer Network Defense
141(24)
Mark Ballora
Nicklaus A. Giacobe
Michael McNeese
David L. Hall
Chapter 10 Usefulness of Sensor Fusion for Security Incident Analysis
165(16)
Ciza Thomas
N. Balakrishnan
Chapter 11 GCD: A Global Collaborative Defense Approach to Thwart Internet Attacks
181(20)
Subrata Acharya
Chapter 12 DNSSEC vs. DNSCurve: A Side-by-Side Comparison
201(20)
Marios Anagnostopoulos
Georgios Kambourakis
Elisavet Konstantinou
Stefanos Gritzalis
Chapter 13 IEEE802.21 Assisted Fast Re-Authentication Scheme over GSABA
221(24)
Qazi Bouland Mussabbir
Thomas John Owens
Section 3 SA CND Applications
Chapter 14 Modelling Situation Awareness Information and System Requirements for the Mission using Goal-Oriented Task Analysis Approach
245(18)
Cyril Onwubiko
Chapter 15 On Situational Aware En-Route Filtering against Injected False Data in Wireless Sensor Networks
263(21)
Xinyu Yang
Jie Lin
Wei Yu
Xinwen Fu
Genshe Chen
Erik P. Blasch
Chapter 16 Attack Graphs and Scenario Driven Wireless Computer Network Defense
284(18)
Peter J. Hawrylak
George Louthan IV
Jeremy Daily
John Hale
Mauricio Papa
Chapter 17 Advanced Security Incident Analysis with Sensor Correlation
302(18)
Ciza Thomas
N. Balakrishnan
Chapter 18 PITWALL: Tools, Techniques and Metrics for the Optimization of Enterprise Network Defense Systems
320(24)
Subrata Acharya
Chapter 19 Forensic Investigative Process for Situational Awareness in Information Security
344(13)
Khidir Mohamed Ali
Thomas John Owens
Compilation of References 357(24)
About the Contributors 381(9)
Index 390