Cyberspace Security and Defense: Research Issues (eBook)

Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004.
eBook Download: PDF
2005 | 2005
X, 382 Seiten
Springer Netherland (Verlag)
978-1-4020-3381-0 (ISBN)

Lese- und Medienproben

Cyberspace Security and Defense: Research Issues -
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Cyberspace security is a critical subject of our times.

On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security.

Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not 'Should we do something for enhancing our digital assets security', the question is 'How to do it'.


Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security.Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "e;Should we do something for enhancing our digital assets security"e;, the question is "e;How to do it"e;.

Preface.
Part 1: General Security Issues. IT Security Development: Computer-Aided Tool Supporting Design and Evaluation; A. Bialas. A Case for Public and Private Review of Developing IT Security Standards; R.A. Frenc and T. Grance. Assuring Critical Information Infrastructure; S.K. Katsikas. Systemic Challenges for Critical Information Infrastructure Protection; M. Masera. Decentralized Energy Supply to Secure Computer Systems; I. Tyukhov.
Part 2: Dependability Safety Analysis Methods—Software Development Questions; T. Cichocki. Trust Case—A Case for Trustworthiness of IT Infrastructures; J. Górski. Dependability, Structure, and Infrastructure; B. Randell. Design for Safety and Security of Complex Embedded Systems: A Unified Approach; E. Schoitsch.
Part 3: Networks Design of Distributed Sensor Networks for Security and Defense; Z. Karakehayov. A Distributed Approach to the Recognition of Geographically Located IP Devices; G. Markowsky et al. Situational Awareness and Network Traffic Analysis; J. McHugh et al.
Part 4: Early Warning Information Systems and Secure Access Control Honeynets: Foundations for the Development of Early Warning Information Systems; F. Pouget et al. IRIS Biometrics for Secure Remote Access; A. Pacut et al. New Directions in Access Control; P. Samarati and S. De Capitani di Vimercati.
Part 5: Cryptography Improved Block Cipher Counter Mode of Operations Schemes; I. Gorbenko and S. Golovashich. Electronic Signature in Real World; V. Jokovd. A Note on Two Significant Developments in Cyberspace Security and Defense; J.S. Kowalik. A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol; B. Ziólkowski and J. Stoklosa.
Part 6: Intrusion Detection An Infrastructure for Distributed Event Acquisition; H. Debar et al. Some Aspects of Neural Network: Approach for Intrusion Detection; V. Golovko and P. Kochurko.

Erscheint lt. Verlag 26.8.2005
Reihe/Serie Nato Science Series II:
NATO Science Series II: Mathematics, Physics and Chemistry
NATO Science Series II: Mathematics, Physics and Chemistry
Zusatzinfo X, 382 p.
Verlagsort Dordrecht
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften
Schlagworte ACCESS • Access Control • biometrics • Communication • cryptography • Database • Databases • Distributed Computing • Information • information system • Intrusion Detection • IT Security • security
ISBN-10 1-4020-3381-8 / 1402033818
ISBN-13 978-1-4020-3381-0 / 9781402033810
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 8,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99