Fr. 256.00

Statistical Methods in Computer Security

English · Hardback

Shipping usually within 3 to 5 weeks

Description

Read more

Klappentext Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy! firewalls! and security issues related to passwords. It addresses crime and misconduct on the Internet! considers the development of infrastructures that may prevent breaches of security and law! and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software! firewalls! and other network security equipment. Zusammenfassung Discusses the advancements in computer security policy, firewalls, and security issues related to passwords. This work addresses crime and misconduct on the Internet, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment. Inhaltsverzeichnis Development of Organization Internet Security Policy: An Hilisitc ApproachSharman LichtensteinSecurity for Future Computing EnvironmentsLynn Margaret BattenManaging Software Security Risks: Buffer Overflows and BeyondGary McGrawExperiments in Wireless Internet SecurityVipul Gupta and Sumit GuptaThe Neverending Saga of Internet Security: Why? How? And What to do Next?Eddie RabinovitchSecure Compartmented Data Access Over an Untrusted Network Using a Co-Based ArchitecturePaul C. Clark! Marion C. Meissner! and Karen O. VanceInternet SecurityMatt Bishop. Steven Cheung! Jeremy Frank! James Haogland! Steven Samorodin! and Chris WeeComputer Security: The Good! the Bad! and the UglyCatherine MeadowsArchitecture and Applications for a Distributed Embedded FirewallCharles Payne and Tom MarkhamUsing Operating System Wrappers to Increase the Resiliency of Commercial FirwallsJeremy Epstein! Linda Thomas! and Eric MonteithA Susceptible-Infected-Susceptible Model with Reintroduction for Computer Virus EpidemicsJohn C. WiermanMan vs. Machine-A Study of the Ability of Statistical Methodologies to Discern Human Generated ssh Traffic from Machine Generated scp TrafficJefrey L. Solka! Michelle L. Adams! and E.J. WegmanPassive Detection of Denial of Service Attacks on the InternetDavid J. MarchetteOn the Extiction of the S-I-S Stochastic Logistic EpidemicRichard J. Kryscio and Claude LefevreSecure Introduction of One-Way FunctionsDennis VolpanoPolicy-Based Authentication and Authorization Secure Access to the Network InfrastructureJeff HayesThe Evolution of Viruses and WormsThomas M. Chen and Jean-Marc RobertInfrastructure Web: Distributed Monitoring and Managing Critical InfrastructuresGuofei Jiang! Goerge Cybenko! and Dennis McGrathFirewalls: An Expert RoundtableA New Model for Probabilistic Information Retrieval on the WebGabriel Mateescu! Masha Sosonkina! and Paul Thompson ...

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.