Advances in Computers -  Marvin Zelkowitz

Advances in Computers (eBook)

Information Security
eBook Download: PDF
2004 | 1. Auflage
340 Seiten
Elsevier Science (Verlag)
978-0-08-047189-1 (ISBN)
Systemvoraussetzungen
154,10 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
"The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes information security issues and includes topics like certifying computer professionals, non-invasive attacks (cognitive hacking), computer files as legal evidence (computer forensics) and the use of processors on plastic (smartcards).

The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described.

?In-depth surveys and tutorials on new computer technology
?Well-known authors and researchers in the field
?Extensive bibliographies with most chapters
?Five out of seven chapters focus on security issues
?Discussion of computer forensics, professional certification and smart cards
?A chapter on how DNA sequencing is accomplished is important in the growing bioinformatics field."
Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes information security issues and includes topics like certifying computer professionals, non-invasive attacks ("e;cognitive hacking"e;), computer files as legal evidence ("e;computer forensics"e;) and the use of processors on plastic ("e;smartcards"e;). The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described. - In-depth surveys and tutorials on new computer technology- Well-known authors and researchers in the field- Extensive bibliographies with most chapters- Five out of seven chapters focus on security issues- Discussion of computer forensics, professional certification and smart cards- A chapter on how DNA sequencing is accomplished is important in the growing bioinformatics field

Cover 1
Contents 6
Contributors 10
Preface 14
Licensing and Certification of Software Professionals 16
Introduction 17
Overview 17
Area of Competency 19
Procedure 20
Renewal 20
Summary 21
Licensing of Software Engineers 21
The Nature and Development of Software Engineering 21
The Guide to the Software Engineering Body of Knowledge (SWEBOK) 24
Overview 24
Body of Knowledge Content 25
Criticisms of the SWEBOK Guide and BOK Efforts in General 27
Software Engineering Degree Programs and Accreditation 28
Legal Issues in Professional Licensing 32
Pros and Cons of Licensing Software Engineers 34
Examples of Licensing 37
Canada 37
United States 38
Examples of National Certification 40
United Kingdom 40
Australia 41
Ireland 41
The Certification of Software Developers 42
Institute-Based Certification Programs 42
ASQ 42
CSDP 42
ICCP 43
Company-Based Certification Programs 44
Conclusions and Future Directions 44
Acknowledgements 46
References 46
Cognitive Hacking 50
Introduction 51
Background 52
Perception Management 54
Computer Security Taxonomies 54
Semantic Attacks and Information Warfare 56
Deception Detection 57
Cognitive Hacking and Intelligence and Security Informatics 57
Examples of Cognitive Hacking 59
Internet Examples 59
NEI Webworld Case 59
The Jonathan Lebed Case 60
Fast-Trade.com Website Pump and Dump 62
PayPal.com 62
Emulex Corporation 62
Non-financial Fraud-Web Search Engine Optimization 63
Non-financial Fraud-CartoonNetwork.com 63
Bogus Virus Patch Report 64
Usenet Perception Management 64
Political Website Defacements-Ariel Sharon Site 64
Political Website Defacements-Hamas Site 64
New York Times Site 65
Yahoo Site 65
Website Defacements Since 11 September Terrorist Incident 65
Fluffi Bunni Declares Jihad 65
Website Spoofing-CNN Site 66
Website Spoofing-WTO Site 66
Insider Threat 66
Economic and Digital Government Issues Related to Cognitive Hacking 68
An Information Theoretic Model of Cognitive Hacking 68
A Horse Race 68
Applying the Horse Race Example to the Internet 70
Theories of the Firm and Cognitive Hacking 71
Digital Government and Cognitive Hacking 71
Legal Issues Related to Cognitive Hacking 72
Cognitive Hacking Countermeasures 75
Single Source Cognitive Hacking 76
Authentication of Source 76
Information ``Trajectory'' Modeling 77
Ulam Games 77
Linguistic Countermeasures with Single Sources 78
Genre Detection and Authority Analysis. 78
Psychological Deception Cues. 78
Multiple Source Cognitive Hacking 78
Source Reliability via Collaborative Filtering and Reliability Reporting 79
An Example of a Multiple Source Collaborative Filtering Model for Multiple News Sources. 79
Byzantine Generals Models 80
Detection of Collusion by Information Sources 81
Linguistic Countermeasures with Multiple Sources 82
Authorship Attribution. 82
Future Work 82
Summary and Conclusions 82
Acknowledgements 83
References 83
The Digital Detective: An Introduction to Digital Forensics 90
Introduction 91
Computers and Crime 92
Digital Evidence 93
Differences From Traditional Evidentiary Sources 94
Constraints on Technology 95
The Forensics Process 95
The Identification Phase 98
The Preparation Phase 99
The Strategy Phase 101
The Preservation Phase 102
The Collection Phase 103
Duplicates vs Copies 104
Ensuring Preservation of Evidence During Collection 105
Using Cryptographic Hashes to Demonstrate Preservation 108
Duplication Speed and Personnel Resources 109
Preserving Dynamic Data 109
Minimizing Intrusion During Collection 110
Forensic Challenges of Ubiquitous Computing 110
Expertise and Law Enforcement 111
The Examination and Analysis Phases 111
The Forensics Environment 112
Searching for Evidence 114
Information Abstraction 115
Eliminating Known Good 115
Searching for Images and Sounds 117
Recovering Deleted Files 120
Collecting Evidence from Live Systems 121
The Presentation Phase 122
Best Evidence 122
Authenticity 123
The Daubert Standard 124
An Illustrative Case Study: Credit Card Fraud 125
Alternate Scenario 1 126
Alternate Scenario 2 128
Alternate Scenario 3 129
Law Enforcement and Digital Forensics 130
Organizational Structures of Digital Forensics Capabilities 131
Research Issues in Digital Forensics 132
Conclusions 133
References 133
Survivability: Synergizing Security and Reliability 136
Introduction 137
The Problem: Combining Reliability and Security 137
Survivability Techniques 139
Design Time: Fault Isolation 140
Mandatory Access Controls 140
Firewalls 143
Implementation Time: Writing Correct Code 144
Run Time: Intrusion Prevention 144
Recovery Time: Intrusion Tolerance 148
Evaluating Survivability 150
Formal Methods 151
Empirical Methods 151
Related Work 154
Conclusions 155
References 156
Smart Cards 162
Introduction 164
Overview 164
The Invention of Smart Cards 166
A Typical Smart Card Transaction 169
Smart Card Technology 171
Technology Overview 171
Physical Characteristics 172
Contact and Contactless Smart Cards 175
Physical Characteristics of the Integrated Circuit (IC) Chip 175
Processor Capacity 177
Current Specifications 178
Smart Card Standards 179
Smart Card Standards Organizations 179
Early Smart Card Standards 181
ISO 7810. 181
ISO 7811. 181
ISO 7813 181
Contact Smart Card Standards 181
ISO 7816. 181
Contactless Smart Cards Standards 182
ISO/IEC 10536 Close Coupling Cards. 182
ISO/IEC 14443 Proximity Cards. 184
ISO/IEC 15693 Vicinity Cards. 185
Nonstandard Contactless Technologies 185
Comparison of ISO/IEC 14443 and ISO/IEC 15693 185
The Role of Standards 188
Associated Access Technologies 188
Electro-Technology Access: The Magnetic Stripe 189
Coding the Magnetic Stripe 191
Barcodes 192
RISC-Based Smart Cards and The Java Virtual Machine 193
Multiple Applications 194
Smart Card Security 194
Physical Security 194
Data Security 195
Future Developments 198
Glossary of Terms 201
References 203
Shotgun Sequence Assembly 208
Introduction 209
Shotgun Sequencing Overview 211
Assembly Paradigms 220
Shortest Superstring 222
Overlap-Layout-Consensus 224
Sequencing by Hybridization 226
Hierarchical Assembly 229
Machine Learning 232
Assembly Modules 232
Overlap Detection 232
Error Correction and Repeat Separation 237
Repeat Identification 241
Consensus Generation 243
Scaffolding 246
Assembly Validation 249
Exotic Assembly 251
Polymorphism Identification and Haplotype Separation 252
Comparative Assembly 254
Multiple Organisms 255
Heterogeneous Assembly 256
Conclusions 256
Acknowledgements 257
References 257
Advances in Large Vocabulary Continuous Speech Recognition 264
Introduction 265
Front End Signal Processing 266
Mel Frequency Cepstral Coefficients 267
Perceptual Linear Predictive Coefficients 269
Discriminative Feature Spaces 270
The Acoustic Model 271
Hidden Markov Model Framework 271
Acoustic Context Models 272
Gaussian Mixture State Models 274
Maximum Likelihood Training 275
Maximum Mutual Information Training 276
Language Model 278
Finite State Grammars 278
N-gram Models 279
Smoothing 280
Additive Smoothing. 280
Low-Order Backoff. 281
Low-Order Interpolation. 281
Cross-LM Interpolation 282
N-gram Models as Finite State Graphs 283
Pruning 285
Class Language Models 286
Search 287
The Viterbi Algorithm 288
Statically Compiled Decoding Graphs (HMMs) 289
Dynamically Compiled Decoding Graphs (HMMs) 290
Multipass Lattice Decoding 290
Consensus Decoding 291
System Combination 292
Adaptation 293
MAP Adaptation 293
Vocal Tract Length Normalization 294
MLLR 296
Model Space MLLR 297
Feature Space MLLR 298
Performance Levels 299
Conclusion 301
References 301
Author Index 308
Subject Index 318
Contents of Volumes in This Series 330

PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99