Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face. The papers in this issue are: • "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years. • "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations. • "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne ́c ̆ka, Peter Hanác ̆ek and Matej Kac ̆ic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software. • "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection. • "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.
"Sinopsis" puede pertenecer a otra edición de este libro.
Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face. The papers in this issue are: · "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years. · "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations. · "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne ́c ̆ka, Peter Hanác ̆ek and Matej Kac ̆ic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software. · "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection. · "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 4,72 gastos de envío desde Reino Unido a España
Destinos, gastos y plazos de envíoLibrería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9788793102965_new
Cantidad disponible: Más de 20 disponibles
Librería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
PAP. Condición: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. del artículo: L0-9788793102965
Cantidad disponible: Más de 20 disponibles
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. del artículo: L0-9788793102965
Cantidad disponible: Más de 20 disponibles
Librería: Chiron Media, Wallingford, Reino Unido
PF. Condición: New. Nº de ref. del artículo: 6666-IUK-9788793102965
Cantidad disponible: 10 disponibles
Librería: moluna, Greven, Alemania
Condición: New. KlappentextrnrnCyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of s. Nº de ref. del artículo: 5809834
Cantidad disponible: Más de 20 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face.The papers in this issue are: ¿ 'The Sad History of Random Bits' by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years. ¿ 'Fast Network Attack Modeling and Security Evaluation based on Attack Graphs' by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations. ¿ 'Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance' by Peter Jurne ¿c ¿ka, Peter Hanác ¿ek and Matej Kac ¿ic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software. ¿ 'Memory Acquisition by Using a Network Card' by Stefan Balogh of Slovakia outlines a new approach to rootkit detection. ¿ 'Making Static Code Analysis More Efficient' by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient. Nº de ref. del artículo: 9788793102965
Cantidad disponible: 1 disponibles
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
Condición: New. Nº de ref. del artículo: ABLIING23Apr0316110324972
Cantidad disponible: Más de 20 disponibles