Brooks | Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks | Buch | 978-0-8493-2272-3 | www2.sack.de

Buch, Englisch, 396 Seiten, Format (B × H): 161 mm x 240 mm, Gewicht: 757 g

Brooks

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks


1. Auflage 2004
ISBN: 978-0-8493-2272-3
Verlag: CRC Press

Buch, Englisch, 396 Seiten, Format (B × H): 161 mm x 240 mm, Gewicht: 757 g

ISBN: 978-0-8493-2272-3
Verlag: CRC Press


The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms.

Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.

Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.

Brooks Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks jetzt bestellen!

Zielgruppe


Professional


Autoren/Hrsg.


Weitere Infos & Material


Overview. Network Security Problems. Current Security Solutions. Disruptive Technologies. Understanding Networks. Understanding Mobile Code. Protecting Mobile Code. Protecting Mobile Code Platforms. Maintaining Trust on the Network. Designing Peer-To-Peer Systems. Emergent Routing and Resource Discovery. Denial of Service Countermeasures. Conclusions. Index.




Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.