05044nam 2200637 450 991079109030332120230803220827.01-118-65168-51-118-65173-1(CKB)2550000001189686(EBL)1598809(SSID)ssj0001155393(PQKBManifestationID)11624526(PQKBTitleCode)TC0001155393(PQKBWorkID)11178460(PQKB)11122655(MiAaPQ)EBC1598809(Au-PeEL)EBL1598809(CaPaEBR)ebr10829812(CaONFJC)MIL568611(OCoLC)868965198(EXLCZ)99255000000118968620140209h20142014 uy 0engur|n|---|||||txtccrCyber security /edited by John G. VoellerHoboken, New Jersey :John Wiley & Sons,2014.©20141 online resource (126 p.)Description based upon print version of record.1-118-65164-2 1-306-37360-3 Includes bibliographical references and index.Cover; Title Page; Contents; Preface; Chapter 1 Cyber Security Metrics and Measure; 1.1 Introduction; 1.2 Contrasting Metrics and Measures; 1.3 Selecting Measures to Support Metrics; 1.4 Problems with the Accuracy of Measures; 1.5 Problems with the Selection of Measures; 1.6 Problems with the Use of Measures; 1.7 Common Vulnerability Scoring System (CVSS); 1.8 Research Directions; References; Further Reading; Chapter 2 Multilevel Security; 2.1 Introduction; 2.2 Background; 2.3 Multilevel Security Policies; 2.3.1 Confinement; 2.3.2 Supporting Policies; 2.3.3 Trusted Subjects2.4 Enforcement of Multilevel Security Policies2.4.1 Design Approaches; 2.4.2 Threats to MLS Systems; 2.4.3 Assurance; 2.4.4 Secure MLS System Development; 2.4.5 Covert Channels; 2.4.6 Object Reuse Considerations; 2.4.7 Target Environment; 2.4.8 Cascade Problem; 2.5 Platforms and Architectures for Multilevel Security; 2.5.1 Use of Applications in MLS Systems; 2.6 Conclusion; References; Chapter 3 Trusted Platforms: The Root of Security; 3.1 Introduction; 3.2 The State of Trusted Computing; 3.2.1 Why Hardware Security?; 3.2.2 Essentials of Trusted Computing; 3.2.3 Extension to Storage3.2.4 Biometric Devices as Physical Interface3.2.5 Usage Model; 3.3 International Scope; 3.3.1 Integration; 3.3.2 Trusted Software; 3.3.3 Networking Trusted Platforms; 3.4 Expanding the Ring of Trust; 3.5 Remaining Challenges; References; Further Reading; Chapter 4 Cyber Security Technology Usability and Management; 4.1 Introduction; 4.2 Usability and Security: Current Research; 4.2.1 Improving Existing Security Technologies; 4.3 Systems Management; 4.4 Web Security and Phishing; 4.4.1 Designing New Technologies with Usability in Mind; 4.4.2 Design Guidelines for Building Better Systems4.5 Open Challenges and Take-Aways4.6 Conclusions; References; Further Reading; Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms; 5.1 Introduction; 5.2 Scientific Overview; 5.2.1 Security Properties; 5.2.2 Constraints on the Design Space; 5.2.3 Solution Approaches; 5.2.4 Physical Layer; 5.2.5 Networking Layers; 5.2.6 Middleware and Applications; 5.3 Global Research and Funding; 5.4 Critical Needs Analysis; 5.5 Research Directions; References; Further Reading; Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies6.1 Honeypot Essentials6.2 Honeypot Risk; Legal and Ethical Issues; 6.3 Honeynet Technologies; 6.3.1 Generation III Honeynet; 6.3.2 Global Distributed Honeynet (GDH); 6.3.3 Honeyclients; 6.3.4 Low-Interaction Malware Collectors; References; Chapter 7 Security of Web Application and Services and Service-Oriented Architectures; 7.1 Introduction; 7.2 SOA Security Challenges; 7.3 Secure Web Services for SOA; 7.3.1 Transport-Based Security; 7.3.2 Message-Based Security; 7.4 Web Service Security Directions; 7.4.1 Federation; 7.4.2 Identity; 7.5 Summary; ReferencesChapter 8 Industrial Process Control System Security Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed. Computer networksSecurity measuresCyberspaceSecurity measuresComputer networksSecurity measures.CyberspaceSecurity measures.005.8Voeller John G864507MiAaPQMiAaPQMiAaPQBOOK9910791090303321Cyber security3778581UNINA02679nam 2200601Ia 450 991080871770332120240501033720.00-19-045159-90-19-024193-41-282-11468-997866121146870-19-970791-X(CKB)1000000000767458(EBL)453604(OCoLC)428700292(OCoLC)664327856(StDuBDS)EDZ0001111176(Au-PeEL)EBL453604(CaPaEBR)ebr10300133(CaONFJC)MIL211468(MiAaPQ)EBC453604(EXLCZ)99100000000076745820130718d2009 uy 0engur|n|---|||||txtrdacontentcrdamediacrrdacarrierOvercoming depression a cognitive therapy approach : workbook /Mark Gilson ... [et al.]2nd ed.Oxford ;New York Oxford University Press20091 online resource (209 p.)Treatments that workDescription based upon print version of record.0-19-537102-X Contents; Chapter 1 Overview; Chapter 2 Beginning Questions and Answers; Chapter 3 The Theory and Practice of Cognitive Therapy; Chapter 4 Understanding Your Body: The B of the BEAST; Chapter 5 Understanding the Impact of Emotion: The E of the BEAST; Chapter 6 Taking Action: The A of the BEAST; Chapter 7 Life Situations and Vulnerability: The S of the BEAST; Chapter 8 Thoughts and Depression: The T of the BEAST; Chapter 9 Relapse Prevention; Chapter 10 Final Words of Hope; Appendix of FormsThis workbook is designed to help you as you work together with a qualified mental health professional to overcome your depression. The program described will help you develop a set of coping strategies and skills so that you can proactively deal with depression and prevent it from compromising your quality of life. Based on the idea that depression is a ""beast"" to be tamed, the treatment utilizes an acronym to help you understand the goals of treatment. You will work with your therapiTreatments that work.Depression, MentalTreatmentCognitive therapyDepression, MentalTreatment.Cognitive therapy.616.852616.852706616.8527Gilson Mark1671256MiAaPQMiAaPQMiAaPQBOOK9910808717703321Overcoming depression4033670UNINA