Chen | Statistical Methods in Computer Security | E-Book | sack.de
E-Book

E-Book, Englisch, 376 Seiten

Reihe: Statistics: A Series of Textbooks and Monographs

Chen Statistical Methods in Computer Security


Erscheinungsjahr 2004
ISBN: 978-1-4200-3088-4
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 376 Seiten

Reihe: Statistics: A Series of Textbooks and Monographs

ISBN: 978-1-4200-3088-4
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.

Chen Statistical Methods in Computer Security jetzt bestellen!

Zielgruppe


Applied statisticians, specialists and technicians in computer technology, security, and design


Autoren/Hrsg.


Weitere Infos & Material


Development of Organization Internet Security Policy: An Hilisitc Approach
Sharman Lichtenstein
Security for Future Computing Environments
Lynn Margaret Batten
Managing Software Security Risks: Buffer Overflows and Beyond
Gary McGraw
Experiments in Wireless Internet Security
Vipul Gupta and Sumit Gupta
The Neverending Saga of Internet Security: Why? How? And What to do Next?
Eddie Rabinovitch
Secure Compartmented Data Access Over an Untrusted Network Using a Co-Based Architecture
Paul C. Clark, Marion C. Meissner, and Karen O. Vance
Internet Security
Matt Bishop. Steven Cheung, Jeremy Frank, James Haogland, Steven Samorodin, and Chris Wee
Computer Security: The Good, the Bad, and the Ugly
Catherine Meadows
Architecture and Applications for a Distributed Embedded Firewall
Charles Payne and Tom Markham
Using Operating System Wrappers to Increase the Resiliency of Commercial Firwalls
Jeremy Epstein, Linda Thomas, and Eric Monteith
A Susceptible-Infected-Susceptible Model with Reintroduction for Computer Virus Epidemics
John C. Wierman
Man vs. Machine-A Study of the Ability of Statistical Methodologies to Discern Human Generated ssh Traffic from Machine Generated scp Traffic
Jefrey L. Solka, Michelle L. Adams, and E.J. Wegman
Passive Detection of Denial of Service Attacks on the Internet
David J. Marchette
On the Extiction of the S-I-S Stochastic Logistic Epidemic
Richard J. Kryscio and Claude Lefevre
Secure Introduction of One-Way Functions
Dennis Volpano
Policy-Based Authentication and Authorization Secure Access to the Network Infrastructure
Jeff Hayes
The Evolution of Viruses and Worms
Thomas M. Chen and Jean-Marc Robert
Infrastructure Web: Distributed Monitoring and Managing Critical Infrastructures
Guofei Jiang, Goerge Cybenko, and Dennis McGrath
Firewalls: An Expert Roundtable
A New Model for Probabilistic Information Retrieval on the Web
Gabriel Mateescu, Masha Sosonkina, and Paul Thompson



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.