- 5 Results
Lowest price: € 8.00, highest price: € 48.45, average price: € 36.78
1
Department of Defense Sponsored Information Security Research - Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs
Order
at lehmanns.de
€ 43.99
OrderSponsored link
Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs:

Department of Defense Sponsored Information Security Research - First edition

2007, ISBN: 9780470128572

New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, * After September 11th, the Department of Defense (DoD) undertooka massive and classified resea… More...

Shipping costs:Does not ship to your country., plus shipping costs
2
Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats - Cliff Wang
Order
at hive.co.uk
£ 33.99
(aprox. € 39.45)
OrderSponsored link

Cliff Wang:

Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats - new book

ISBN: 9780470128572

After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret infor… More...

No. 9780470128572. Shipping costs:Instock, Despatched same working day before 3pm, plus shipping costs.
3
Department of Defense Sponsored Information Security Research - Cliff Wang, Steven King, Ralph Wachter, Robert Herklotz, Chris Arney, Gary Toth, David Hislop, Sharon Heise, Todd Combs
Order
at Perlego.com
€ 8.00 (Rent/month)
Shipment: € 0.001
Order (Rent/month)Sponsored link
Cliff Wang, Steven King, Ralph Wachter, Robert Herklotz, Chris Arney, Gary Toth, David Hislop, Sharon Heise, Todd Combs:
Department of Defense Sponsored Information Security Research (Monthly rent. Yearly subscription.)

ISBN: 9780470128572

Wiley Computer Networking extensive; pages; years; summarize; research; traditional; methods; critical; longer; infrastructures; adequate; information; department; extensive university re… More...

Shipping costs: EUR 0.00
4
Department of Defense Sponsored Information Security Research - Cliff Wang; Chris Arney; Todd Combs; Sharon Heise; Robert Herklotz; David Hislop; Steven King; Gary Toth; Ralph Wachter
Order
at lehmanns.de
€ 43.99
Shipment: € 0.001
OrderSponsored link
Cliff Wang; Chris Arney; Todd Combs; Sharon Heise; Robert Herklotz; David Hislop; Steven King; Gary Toth; Ralph Wachter:
Department of Defense Sponsored Information Security Research - First edition

2007, ISBN: 9780470128572

New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, [PU: Wiley], Wiley, 2007

Shipping costs:Download sofort lieferbar. (EUR 0.00)
5
Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats
Order
at amazon.co.uk
£ 41.74
(aprox. € 48.45)
Shipment: € 8.101
OrderSponsored link
Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats - new book

ISBN: 9780470128572

Digital Download, Produktgruppe: Digital Book Service, Subjects, Books, [PU: Wiley]

Shipping costs:In stock. Lieferung von Amazon. (EUR 8.10) Amazon.co.uk

1As some platforms do not transmit shipping conditions to us and these may depend on the country of delivery, the purchase price, the weight and size of the item, a possible membership of the platform, a direct delivery by the platform or via a third-party provider (Marketplace), etc., it is possible that the shipping costs indicated by find-more-books.com / find-more-books.com do not correspond to those of the offering platform.

Bibliographic data of the best matching book

Details of the book

Details of the book - Department of Defense Sponsored Information Security Research


EAN (ISBN-13): 9780470128572
ISBN (ISBN-10): 0470128577
Publishing year: 2007
Publisher: Wiley

Book in our database since 2008-12-31T20:29:11-05:00 (New York)
Detail page last modified on 2024-02-16T05:35:05-05:00 (New York)
ISBN/EAN: 9780470128572

ISBN - alternate spelling:
0-470-12857-7, 978-0-470-12857-2
Alternate spelling and related search-keywords:
Book author: wachter, david king, toth, king steven, ralph röber, hislop, sharon, herklotz, robert wang, cliff david, langley
Book title: information security, department


Information from Publisher

Author: Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs
Title: Department of Defense Sponsored Information Security Research - New Methods for Protecting Against Cyber Threats
Publisher: Wiley; John Wiley & Sons
688 Pages
Publishing year: 2008-02-13
Language: English
43,99 € (DE)
Not available (reason unspecified)

EA; E107; E-Book; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Computernetzwerke und maschinelle Kommunikation; Computer Science; Informatik; Networking; Netzwerk; Netzwerke; Netzwerke; BB

Foreword. Acknowledgements. Introduction (Steven King). Chapter 1. Architecting Information Infrastructures forSecurity (Cliff Wang). 1.1 Architectures for Secure and Robust DistributedInfrastructures. 1.2 A complex Adaptive System Approach to QoS Assurance andStateful Resource Management for Dependable InformationInfrastructure. 1.3 Anomaly and Misuse Detection in Network TrafficStreams-Checking and Machine Learning Approaches. 1.4 Distributed Systems Security via Logical Framework. 1.5 Distributed Immune Systems for Wireless Networks InformationAssurance. 1.6 Hi-DRA High-Speed, Wide-Area Network Detection, Response,and Analysis. Chapter 2. At the Edges of the Critical InformationInfrastructure (David Hislop, Todd Combs). 2.1 Enabling Dynamic Security Management of Networked Systemsvia Device-Embedded Security. 2.2 Software Model Checking for Embedded Systems. 2.3 Advanced tool Integration for Embedded System Assurance. 2.4 Verification Tools for Embedded Systems. Chapter 3. Software Engineering for Assurance (RalphWachter, Gary Toth). 3.1 Static Analysis to Enhance toe Power of Model Checking forConcurrent Software. 3.2 Protecting COTS from the Inside. 3.3 RAPIDware: Component-Based Development of Adaptive andDependable Middleware. 3.4 Generating Efficient Trust Management Software fromPolicies. 3.5 Modeling and Simulation Environment for Critical InformationProtection. Chapter 4. Malicious Mobile Code (Ralph Wachter, GaryToth). 4.1 Language-Based Security for Malicious Mobile Code. 4.2 Model-Carrying Code: A New Approach to Mobile-CodeSecurity. 4.3 Neutralizing Malicious Mobile Code. Chapter 5. Dependable Critical Information Infrastructure forCommand and Control (Robert Herklotz, Chris Arney). 5.1 Trustworthy Infrastructure, Mechanisms, and Experimentationfor Diffuse Computing. 5.2 Adaptable Situation-Aware Secure Services-Based Systems. 5.3 Detecting Deception in the Military Infosphere: Improvingand Integrating Human Detection Capabilities with AutomatedTools. 5.4 Vulnerability Assessment Tools for Complex InformationNetworks.

More/other books that might be very similar to this book

Latest similar book:
9780471787563 Department of Defense Information Security Report (Department of Defense; Bollinger, Terry)


< to archive...