0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security (Paperback, 1st ed. 2020) Loot Price: R5,721
Discovery Miles 57 210
Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security (Paperback, 1st ed. 2020): Jiangxing Wu

Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security (Paperback, 1st ed. 2020)

Jiangxing Wu

Series: Wireless Networks

 (sign in to rate)
Loot Price R5,721 Discovery Miles 57 210 | Repayment Terms: R536 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.

General

Imprint: Springer Nature Switzerland AG
Country of origin: Switzerland
Series: Wireless Networks
Release date: 2021
First published: 2020
Authors: Jiangxing Wu
Dimensions: 235 x 155mm (L x W)
Format: Paperback
Pages: 735
Edition: 1st ed. 2020
ISBN-13: 978-3-03-029846-3
Categories: Books > Computing & IT > Computer communications & networking > Network security
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
Promotions
LSN: 3-03-029846-9
Barcode: 9783030298463

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,242 Discovery Miles 12 420
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
PCI Dss: A Pocket Guide
IT Governance Paperback R417 Discovery Miles 4 170
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,724 Discovery Miles 67 240
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,077 Discovery Miles 10 770
Investigations and the Art of the…
Inge Sebyan Black, Lawrence Fennelly Paperback R1,762 Discovery Miles 17 620
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,432 Discovery Miles 64 320

See more

Partners