HOME > 상세정보

상세정보

Disruptive security technologies with mobile code and peer-to-peer networks

Disruptive security technologies with mobile code and peer-to-peer networks

자료유형
단행본
개인저자
Brooks, R. R. (Richard R.)
서명 / 저자사항
Disruptive security technologies with mobile code and peer-to-peer networks / R.R. Brooks.
발행사항
Boca Raton :   CRC Press ,   c2005.  
형태사항
381 p. : ill. ; 25 cm.
ISBN
0849322723 (alk. paper)
서지주기
Includes bibliographical references (p. [355]-372) and index.
일반주제명
Peer-to-peer architecture (Computer networks) Computer networks -- Security measures. Computer viruses. Disruptive technologies.
000 00932camuu22002534a 4500
001 000045219353
005 20060119105052
008 051229s2005 flua b 001 0 eng
010 ▼a 2004057902
020 ▼a 0849322723 (alk. paper)
035 ▼a (OCoLC)ocm56194801
040 ▼a DLC ▼c DLC ▼d YDX ▼d UKM ▼d DLC ▼d WaU ▼d 211009 ▼d 244002
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b B873d
100 1 ▼a Brooks, R. R. ▼q (Richard R.)
245 1 0 ▼a Disruptive security technologies with mobile code and peer-to-peer networks / ▼c R.R. Brooks.
260 ▼a Boca Raton : ▼b CRC Press , ▼c c2005.
300 ▼a 381 p. : ▼b ill. ; ▼c 25 cm.
504 ▼a Includes bibliographical references (p. [355]-372) and index.
650 0 ▼a Peer-to-peer architecture (Computer networks)
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Computer viruses.
650 0 ▼a Disruptive technologies.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 B873d 등록번호 121120481 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 B873d 등록번호 151194288 도서상태 대출가능 반납예정일 예약 서비스 B M ?
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 B873d 등록번호 121120481 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 B873d 등록번호 151194288 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms.

Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.

Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. Disruptive security technologies are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms. This book builds a foundation for developing these adaptive systems, describing the design principles and the fundamentals of this new security paradigm. The author covers topics such as the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.


정보제공 : Aladin

목차

OVERVIEW
NETWORK SECURITY PROBLEMS
Vulnerabilities
Attacks
Threat Modeling
Physical Security
Social Engineering
Privacy
Fraud
Scavenging
Trojan Horses
Trapdoors
Viruses
Worms
Reverse Engineering
Covert Communications Channels and Inferencing
Buffer Overflow and Stack Smashing
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Man in the Middle Attacks
Replay Attacks
Cryptanalysis
DNS and BGP Vulnerabilities
Exercises
CURRENT SECURITY SOLUTIONS
Audits
Encryption
Steganography
Obfuscation
Public Key Infrastructure (PKI)
Code Signing
SSH, SSL, and TLS
Formal Methods
Virus Scanners
Attack Graphs
Security Automata
Sandboxing
Firewalls
Red-Black Separation
Proof Carrying Code
Secure Hardware
Dependability, Safety, Liveness
Quality of Service
Artificial Immune Systems
Exercises
DISRUPTIVE TECHNOLOGIES
Mobile Code
Peer-To-Peer Networks
Field Programmable Gate Arrays (FPGA's)
Adaptation
Conclusion
Exercises
UNDERSTANDING NETWORKS
Internet Protocol Background
Networks of Embedded Control Systems
Network Topology
Scale-Free Graphs
Traffic Flows
Conclusion
Exercises
UNDERSTANDING MOBILE CODE
Existing Paradigms
Existing Implementations
Theoretical Model
Simulator for Model
Models of Paradigms
Simulation Studies of Models
Models of Networking Pathologies
Simulation Studies of Pathologies
Comparison of Cantor with Other Network Simulations
Taxonomies of Mobile Code and Security
Mobile Code Daemon Implementation
Conclusion
Exercises
PROTECTING MOBILE CODE
Control Flow Modification
Bytecode Modification
Protocol for Exchanging Bytecode Tables
Entropy Maximization of Bytecode Mappings
Bytecode Steganography
Use of Secure Co-Processors
Conclusion
Exercises
PROTECTING MOBILE CODE PLATFORMS
Smart Card Applications
Building Control Systems
FPGA Cryptography Engine
Differential Power Analysis
Conclusion
Exercises
MAINTAINING TRUST ON THE NETWORK
Assumptions and Primitives
Mobile Code Verification
Host Verification
Multi-Level Security
Conclusion
Exercises
DESIGNING PEER-TO-PEER SYSTEMS
Graph Theory Background
Random Graph Background
Number of Hops Between Nodes
Dependability of Peer-To-Peer Systems
Vulnerability to Attack
Quality of Service of Peer-To-Peer Systems
Correct Number of Indexes
Key Management
Conclusion
Exercises
EMERGENT ROUTING AND RESOURCE DISCOVERY
Ad Hoc Data Routing Background
Spin-Glass Routing
Multi-Fractal Routing
Pheromone Routing
Comparison of Routing Algorithms
Epidemic Resource Discovery
Conclusion
Exercises
DENIAL OF SERVICE COUNTERMEASURES
Denial of Service (DoS) Background
Traffic Flow Measures
Attack Detection
Verification of Detector
Game Theory Analysis
Network Structure Vulnerabilities
Conclusion
Exercises
CONCLUSIONS
INDEX


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)