Automated Security Management
Editat de Ehab Al-Shaer, Xinming Ou, Geoffrey Xieen Limba Engleză Paperback – 23 aug 2016
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 315.00 lei 6-8 săpt. | |
| Springer International Publishing – 23 aug 2016 | 315.00 lei 6-8 săpt. | |
| Hardback (1) | 321.03 lei 6-8 săpt. | |
| Springer International Publishing – 24 oct 2013 | 321.03 lei 6-8 săpt. |
Preț: 315.00 lei
Preț vechi: 393.74 lei
-20% Nou
Puncte Express: 473
Preț estimativ în valută:
55.76€ • 64.84$ • 48.72£
55.76€ • 64.84$ • 48.72£
Carte tipărită la comandă
Livrare economică 23 ianuarie-06 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319345369
ISBN-10: 3319345362
Pagini: 195
Ilustrații: VIII, 187 p. 62 illus.
Dimensiuni: 155 x 235 x 11 mm
Greutate: 0.28 kg
Ediția:Softcover reprint of the original 1st ed. 2013
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319345362
Pagini: 195
Ilustrații: VIII, 187 p. 62 illus.
Dimensiuni: 155 x 235 x 11 mm
Greutate: 0.28 kg
Ediția:Softcover reprint of the original 1st ed. 2013
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
1: Towards a Unified Modeling and Verification of Network and System Security Configurations.- 2: Modeling and Checking the Security of DIFC System Configurations.- 3: Increasing Android Security using a Lightweight OVAL-based Vulnerability Assessment Framework.- 4: A Declarative Logic-based Approach for Threat Analysis of Advanced Metering Infrastructure.- 5: Risk based Access Control using Classification.- 6: GCNav - Generic Configuration Navigation System.- 7: The Right Files at the Right Time.- 8: Rule Configuration Checking in Secure Cooperative Data Access.- 9: Programmable Diagnostic Network Measurement with Localization and Traffic Observation.- 10: Discovery of Unexpected Services and Communication Paths in Networked Systems.- 11: Tracing Advances Persistent Threats in Networked Systems.
Caracteristici
Discusses how to manage the complex security risk of configuration settings of network systems Explores the relationship between vulnerability assessment and security automation Covers automated/dynamic defense based risk Offers a comprehensive coverage of security automation