Books > Computing & IT > Computer software packages
|
Buy Now
Trusted Recovery and Defensive Information Warfare (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Loot Price: R2,934
Discovery Miles 29 340
|
|
Trusted Recovery and Defensive Information Warfare (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Series: Advances in Information Security, 4
Expected to ship within 10 - 15 working days
|
Information security concerns the confidentiality, integrity, and
availability of information processed by a computer system. With an
emphasis on prevention, traditional information security research
has focused little on the ability to survive successful attacks,
which can seriously impair the integrity and availability of a
system. Trusted Recovery And Defensive Information Warfare uses
database trusted recovery, as an example, to illustrate the
principles of trusted recovery in defensive information warfare.
Traditional database recovery mechanisms do not address trusted
recovery, except for complete rollbacks, which undo the work of
benign transactions as well as malicious ones, and compensating
transactions, whose utility depends on application semantics.
Database trusted recovery faces a set of unique challenges. In
particular, trusted database recovery is complicated mainly by (a)
the presence of benign transactions that depend, directly or
indirectly on malicious transactions; and (b) the requirement by
many mission-critical database applications that trusted recovery
should be done on-the-fly without blocking the execution of new
user transactions. Trusted Recovery And Defensive Information
Warfare proposes a new model and a set of innovative algorithms for
database trusted recovery. Both read-write dependency based and
semantics based trusted recovery algorithms are proposed. Both
static and dynamic database trusted recovery algorithms are
proposed. These algorithms can typically save a lot of work by
innocent users and can satisfy a variety of attack recovery
requirements of real world database applications. Trusted Recovery
And Defensive Information Warfare is suitable as a secondary text
for a graduate level course in computer science, and as a reference
for researchers and practitioners in information security.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,183
Discovery Miles 11 830
A Guide To SQL
Philip Pratt, Hassan Afyouni, …
Paperback
R1,253
R1,119
Discovery Miles 11 190
MIS
Hossein Bidgoli
Paperback
R1,163
R1,047
Discovery Miles 10 470
See more![](//cdn.loot.co.za/shop/img/arrow-right-white.gif)
|