New solutions for cybersecurity / / edited by Howard Shrobe, David L. Shrier, and Alex Pentland |
Pubbl/distr/stampa | Cambridge, Massachusetts : , : MIT Press, , [2018] |
Descrizione fisica | 1 online resource (491 pages) |
Disciplina | 658.4/78 |
Collana | MIT connections science & engineering |
Soggetto topico |
Computer networks - Security measures
Internet - Security measures |
Soggetto genere / forma | Electronic books. |
Soggetto non controllato | INFORMATION SCIENCE/Information Systems |
ISBN | 0-262-34664-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910466784803321 |
Cambridge, Massachusetts : , : MIT Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
New solutions for cybersecurity / / edited by Howard Shrobe, David L. Shrier, and Alex Pentland |
Pubbl/distr/stampa | Cambridge, MA : , : MIT Press, , [2018] |
Descrizione fisica | 1 online resource (491 pages) |
Disciplina | 658.4/78 |
Collana | MIT Connection Science and Engineering |
Soggetto topico |
Computer networks - Security measures
Internet - Security measures |
Soggetto non controllato | INFORMATION SCIENCE/Information Systems |
ISBN | 0-262-34664-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910796593803321 |
Cambridge, MA : , : MIT Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
New solutions for cybersecurity / / edited by Howard Shrobe, David L. Shrier, and Alex Pentland |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cambridge, MA : , : MIT Press, , [2018] |
Descrizione fisica | 1 online resource (491 pages) |
Disciplina | 658.4/78 |
Collana | MIT Connection Science and Engineering |
Soggetto topico |
Computer networks - Security measures
Internet - Security measures |
Soggetto non controllato | INFORMATION SCIENCE/Information Systems |
ISBN | 0-262-34664-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risksâ#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholdersâ#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
CHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISPâ#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy CHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies |
Record Nr. | UNINA-9910810826103321 |
Cambridge, MA : , : MIT Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|