Automated Security Management
Editat de Ehab Al-Shaer, Xinming Ou, Geoffrey Xieen Limba Engleză Hardback – 24 oct 2013
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 320.86 lei 43-57 zile | |
Springer International Publishing – 23 aug 2016 | 320.86 lei 43-57 zile | |
Hardback (1) | 327.02 lei 43-57 zile | |
Springer International Publishing – 24 oct 2013 | 327.02 lei 43-57 zile |
Preț: 327.02 lei
Preț vechi: 408.78 lei
-20% Nou
Puncte Express: 491
Preț estimativ în valută:
62.58€ • 65.01$ • 51.99£
62.58€ • 65.01$ • 51.99£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319014326
ISBN-10: 3319014323
Pagini: 196
Ilustrații: VIII, 187 p. 62 illus.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.45 kg
Ediția:2013
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319014323
Pagini: 196
Ilustrații: VIII, 187 p. 62 illus.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.45 kg
Ediția:2013
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
1: Towards a Unified Modeling and Verification of Network and System Security Configurations.- 2: Modeling and Checking the Security of DIFC System Configurations.- 3: Increasing Android Security using a Lightweight OVAL-based Vulnerability Assessment Framework.- 4: A Declarative Logic-based Approach for Threat Analysis of Advanced Metering Infrastructure.- 5: Risk based Access Control using Classification.- 6: GCNav - Generic Configuration Navigation System.- 7: The Right Files at the Right Time.- 8: Rule Configuration Checking in Secure Cooperative Data Access.- 9: Programmable Diagnostic Network Measurement with Localization and Traffic Observation.- 10: Discovery of Unexpected Services and Communication Paths in Networked Systems.- 11: Tracing Advances Persistent Threats in Networked Systems.
Caracteristici
Discusses how to manage the complex security risk of configuration settings of network systems Explores the relationship between vulnerability assessment and security automation Covers automated/dynamic defense based risk Offers a comprehensive coverage of security automation