skip to content
Disruptive security technologies with mobile code and peer-to-peer networks Preview this item
ClosePreview this item
Checking...

Disruptive security technologies with mobile code and peer-to-peer networks

Author: R R Brooks
Publisher: Boca Raton : CRC Press, 2004, ©2005.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. Disruptive security technologies are proactive in their approach to attacks. This  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Brooks, R.R. (Richard R.).
Disruptive security technologies with mobile code and peer-to-peer networks.
Boca Raton : CRC Press, 2004, ©2005
(DLC) 2004057902
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: R R Brooks
ISBN: 0849322723 9780849322723 9781420038880 1420038885
OCLC Number: 172963420
Description: 1 online resource (381 pages) : illustrations
Contents: OVERVIEW NETWORK SECURITY PROBLEMS Vulnerabilities Attacks Threat Modeling Physical Security Social Engineering Privacy Fraud Scavenging Trojan Horses Trapdoors Viruses Worms Reverse Engineering Covert Communications Channels and Inferencing Buffer Overflow and Stack Smashing Denial of Service (DoS) Distributed Denial of Service (DDoS) Man in the Middle Attacks Replay Attacks Cryptanalysis DNS and BGP Vulnerabilities Exercises CURRENT SECURITY SOLUTIONS Audits Encryption Steganography Obfuscation Public Key Infrastructure (PKI) Code Signing SSH, SSL, and TLS Formal Methods Virus Scanners Attack Graphs Security Automata Sandboxing Firewalls Red-Black Separation Proof Carrying Code Secure Hardware Dependability, Safety, Liveness Quality of Service Artificial Immune Systems Exercises DISRUPTIVE TECHNOLOGIES Mobile Code Peer-To-Peer Networks Field Programmable Gate Arrays (FPGA's) Adaptation Conclusion Exercises UNDERSTANDING NETWORKS Internet Protocol Background Networks of Embedded Control Systems Network Topology Scale-Free Graphs Traffic Flows Conclusion Exercises UNDERSTANDING MOBILE CODE Existing Paradigms Existing Implementations Theoretical Model Simulator for Model Models of Paradigms Simulation Studies of Models Models of Networking Pathologies Simulation Studies of Pathologies Comparison of Cantor with Other Network Simulations Taxonomies of Mobile Code and Security Mobile Code Daemon Implementation Conclusion Exercises PROTECTING MOBILE CODE Control Flow Modification Bytecode Modification Protocol for Exchanging Bytecode Tables Entropy Maximization of Bytecode Mappings Bytecode Steganography Use of Secure Co-Processors Conclusion Exercises PROTECTING MOBILE CODE PLATFORMS Smart Card Applications Building Control Systems FPGA Cryptography Engine Differential Power Analysis Conclusion Exercises MAINTAINING TRUST ON THE NETWORK Assumptions and Primitives Mobile Code Verification Host Verification Multi-Level Security Conclusion Exercises DESIGNING PEER-TO-PEER SYSTEMS Graph Theory Background Random Graph Background Number of Hops Between Nodes Dependability of Peer-To-Peer Systems Vulnerability to Attack Quality of Service of Peer-To-Peer Systems Correct Number of Indexes Key Management Conclusion Exercises EMERGENT ROUTING AND RESOURCE DISCOVERY Ad Hoc Data Routing Background Spin-Glass Routing Multi-Fractal Routing Pheromone Routing Comparison of Routing Algorithms Epidemic Resource Discovery Conclusion Exercises DENIAL OF SERVICE COUNTERMEASURES Denial of Service (DoS) Background Traffic Flow Measures Attack Detection Verification of Detector Game Theory Analysis Network Structure Vulnerabilities Conclusion Exercises CONCLUSIONS INDEX
Responsibility: R.R. Brooks.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/172963420> # Disruptive security technologies with mobile code and peer-to-peer networks
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "172963420" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/970745#Place/boca_raton> ; # Boca Raton
    schema:about <http://id.worldcat.org/fast/1056607> ; # Peer-to-peer architecture (Computer networks)
    schema:about <http://id.worldcat.org/fast/872684> ; # Computer viruses
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.worldcat.org/fast/1737941> ; # Disruptive technologies
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2005" ;
    schema:creator <http://viaf.org/viaf/161733824> ; # Richard R. Brooks
    schema:datePublished "2004" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/970745> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/970745#CreativeWork/disruptive_security_technologies_with_mobile_code_and_peer_to_peer_networks> ;
    schema:name "Disruptive security technologies with mobile code and peer-to-peer networks"@en ;
    schema:productID "172963420" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/172963420#PublicationEvent/boca_raton_crc_press_2004_2005> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/970745#Agent/crc_press> ; # CRC Press
    schema:url <http://marc.crcnetbase.com/isbn/9781420038880> ;
    schema:url <https://login.proxy.bib.uottawa.ca/login?url=http://www.taylorfrancis.com/books/9781420038880> ;
    schema:url <https://login.proxy.bib.uottawa.ca/login?url=http://marc.crcnetbase.com/isbn/9781420038880> ;
    schema:url <http://www.crcnetbase.com/isbn/9780849322723> ;
    schema:url <http://www.taylorfrancis.com/books/9781420038880> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=263134> ;
    schema:url <https://www.taylorfrancis.com/books/9781420038880> ;
    schema:url <http://site.ebrary.com/id/10142740> ;
    schema:workExample <http://worldcat.org/isbn/9780849322723> ;
    schema:workExample <http://worldcat.org/isbn/9781420038880> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/172963420> ;
    .


Related Entities

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1056607> # Peer-to-peer architecture (Computer networks)
    a schema:Intangible ;
    schema:name "Peer-to-peer architecture (Computer networks)"@en ;
    .

<http://id.worldcat.org/fast/1737941> # Disruptive technologies
    a schema:Intangible ;
    schema:name "Disruptive technologies"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872684> # Computer viruses
    a schema:Intangible ;
    schema:name "Computer viruses"@en ;
    .

<http://marc.crcnetbase.com/isbn/9781420038880>
    rdfs:comment "Distributed by publisher. Purchase or institutional license may be required for access." ;
    .

<http://viaf.org/viaf/161733824> # Richard R. Brooks
    a schema:Person ;
    schema:familyName "Brooks" ;
    schema:givenName "Richard R." ;
    schema:givenName "R. R." ;
    schema:name "Richard R. Brooks" ;
    .

<http://worldcat.org/entity/work/data/970745#CreativeWork/disruptive_security_technologies_with_mobile_code_and_peer_to_peer_networks>
    a schema:CreativeWork ;
    rdfs:label "Disruptive security technologies with mobile code and peer-to-peer networks." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/172963420> ; # Disruptive security technologies with mobile code and peer-to-peer networks
    .

<http://worldcat.org/isbn/9780849322723>
    a schema:ProductModel ;
    schema:isbn "0849322723" ;
    schema:isbn "9780849322723" ;
    .

<http://worldcat.org/isbn/9781420038880>
    a schema:ProductModel ;
    schema:isbn "1420038885" ;
    schema:isbn "9781420038880" ;
    .

<http://www.taylorfrancis.com/books/9781420038880>
    rdfs:comment "from CRCnetBASE" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://www.worldcat.org/title/-/oclc/172963420>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/172963420> ; # Disruptive security technologies with mobile code and peer-to-peer networks
    schema:dateModified "2017-11-03" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .

<https://login.proxy.bib.uottawa.ca/login?url=http://marc.crcnetbase.com/isbn/9781420038880>
    rdfs:comment "ENGnetBASE (Restricted to University of Ottawa)" ;
    .

<https://www.taylorfrancis.com/books/9781420038880>
    rdfs:comment "from Taylor & Francis" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.