0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (8)
  • R2,500 - R5,000 (7)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,570 Discovery Miles 35 700 Ships in 10 - 15 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R2,703 Discovery Miles 27 030 Ships in 10 - 15 working days

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,514 Discovery Miles 15 140 Ships in 10 - 15 working days

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Web Information Systems Engineering - WISE 2012 - 13th International Conference, Paphos, Cyprus, November 28-30, 2012,... Web Information Systems Engineering - WISE 2012 - 13th International Conference, Paphos, Cyprus, November 28-30, 2012, Proceedings (Paperback, 2012 ed.)
X.Sean Wang, Isabel Cruz, Alex Delis, Guangyan Huang
R1,730 Discovery Miles 17 300 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Conference on Web Information Systems Engineering, WISE 2012, held in Paphos, Cyprus, in November 2012. The 44 full papers, 13 short papers, 9 demonstrations papers and 9 "challenge" papers were carefully reviewed and selected from 194 submissions. The papers cover various topics in the field of Web Information Systems Engineering.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,815 Discovery Miles 38 150 Ships in 10 - 15 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Time Granularities in Databases, Data Mining, and Temporal Reasoning (Paperback, Softcover reprint of the original 1st ed.... Time Granularities in Databases, Data Mining, and Temporal Reasoning (Paperback, Softcover reprint of the original 1st ed. 2000)
Claudio Bettini, Sushil Jajodia, Sean Wang
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Calendar units, such as months and days, clock units, such as hours and seconds, and specialized units, such as business days and academic years, play a major role in a wide range of information system applications. System support for reasoning about these units, called granularities in this book, is important for the efficient design, use, and implementation of such applications. The book deals with several aspects of temporal information and provides a unifying model for granularities. It is intended for computer scientists and engineers who are interested in the formal models and technical development of specific issues. Practitioners can learn about critical aspects that must be taken into account when designing and implementing databases supporting temporal information. Lecturers may find this book useful for an advanced course on databases. Moreover, any graduate student working on time representation and reasoning, either in data or knowledge bases, should definitely read it.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R2,988 Discovery Miles 29 880 Ships in 10 - 15 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Advances in Data and Web Management - Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009,... Advances in Data and Web Management - Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009, Proceedings (Paperback, 2009 ed.)
Qing Li, Ling Feng, Jian Pei, X.Sean Wang, Xiaofang Zhou, …
R3,088 Discovery Miles 30 880 Ships in 10 - 15 working days

This book constitutes the proceedings of the joint International Conference APWeb/WAIM 2009 which was held in Suzhou, China, during April 1-4, 2009.

The 42 full papers presented together with 26 short papers and the abstracts of 2 keynote speeches were carefully reviewed and selected for inclusion in the book. The topics covered are query processing, topic-based techniques, Web data processing, multidimensional data analysis, stream data processing, data mining and its applications, and data management support to advanced applications.

Web Information Systems Engineering - WISE 2008 - 9th International Conference, Auckland, New Zealand, September 1-3, 2008,... Web Information Systems Engineering - WISE 2008 - 9th International Conference, Auckland, New Zealand, September 1-3, 2008, Proceedings (Paperback, 2008 ed.)
James Bailey, David Maier, Klaus-Dieter Schewe, Bernhard Thalheim, X.Sean Wang
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

WISE 2008 was held in Auckland, New Zealand, during September 1-3, at The Auckland University ofTechnology City Campus Conference Centre. The aim of this conferencewasto providean internationalforum for researchers, professi- als, and industrial practitioners to share their knowledge in the rapidly growing area of Web technologies, methodologies, and applications. Previous WISE c- ferences wereheld in Hong Kong, China (2000), Kyoto, Japan (2001), Singapore (2002), Rome, Italy (2003), Brisbane, Australia (2004), New York, USA (2005), Wuhan, China (2006) and Nancy, France (2007). The call for papers created considerable interest. Around 110 paper s- missions were received and the international Program Committee selected 31 papers out of the 110 submissions (an acceptance rate of 28. 2%). Of these, 17 papers were chosen for standard presentation and the remaining 14 papers for short presentation. The authors of the accepted papers range across 13 co- tries: Australia, China, Germany, Greece, Italy, Japan, Korea, New Zealand, Poland, Singapore, Spain, Switzerland and the USA. The technical track of the WISE 2008 program o?ered nine paper presentation sessions. The selected - pers covered a wide and important variety of issues in Web information systems engineering such as querying; search; ranking; trust; peer-to-peer networks; - formation ?ltering; information integration; agents and mining. A few selected papers from WISE 2008 will be published in a special issue of the World Wide Web Journal, bySpringer. Inaddition, a $1000prizewasawardedto the authors ofthepaperselectedforthe"YahikoKambayashiBestPaperAward. "Wethank all authors who submitted their papers and the Program Committee members andexternalreviewersfor their excellent work.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.): Peng Ning, Sushil Jajodia,... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,654 Discovery Miles 16 540 Ships in 10 - 15 working days

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection complements the protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. Intrusion detection techniques are traditionally categorized into two classes: anomaly detection and misuse detection. Anomaly detection is based on the normal behavior of a subject (a user or a system); any action that significantly deviates from the normal behaviour is considered intrusive. Misuse detection catches intrusions in terms of characteristics of known attacks or system vulnerabilities; any action that conforms to the pattern of known attack or vulnerability is considered intrusive. and network based IDSs according to the source of the audit information used by each IDS. Host-based IDSs get audit data from host audit trails and usually aim at detecting attacks against a single host; distributed IDSs gather audit data from multiple hosts and possibly the network and connects the hosts, aiming at detecting attacks involving multiple hosts; network-based IDSs use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modelling requests among co-operative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Advances in Web-Age Information Management - Second International Conference, WAIM 2001, Xi'an, China, July 9-11, 2001.... Advances in Web-Age Information Management - Second International Conference, WAIM 2001, Xi'an, China, July 9-11, 2001. Proceedings (Paperback, 2001 ed.)
X.Sean Wang, Ge Yu, Hongjun Lu
R1,747 Discovery Miles 17 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Web-Age Information Management, WAIM 2001, held in Xi'an, China, in July 2001.The 21 revised full papers and 12 short papers presented together with 4 research experience papers were carefully reviewed and selected for inclusion in the proceedings. The papers are organized in topical sections on multimedia databases and high-dimensional indexing, information retrieval and text indexing, data mining, semistructured data management, data warehousing and federated databases, Web information management and e-commerce, spatio-temporal and high-dimensional information management, data mining and constraint management, data integration and filtering, and workflow and adaptive systems.

Time Granularities in Databases, Data Mining, and Temporal Reasoning (Hardcover, 2000 ed.): Claudio Bettini, Sushil Jajodia,... Time Granularities in Databases, Data Mining, and Temporal Reasoning (Hardcover, 2000 ed.)
Claudio Bettini, Sushil Jajodia, Sean Wang
R1,707 Discovery Miles 17 070 Ships in 10 - 15 working days

Calendar units, such as months and days, clock units, such as hours and seconds, and specialized units, such as business days and academic years, play a major role in a wide range of information system applications. System support for reasoning about these units, called granularities in this book, is important for the efficient design, use, and implementation of such applications. The book deals with several aspects of temporal information and provides a unifying model for granularities. It is intended for computer scientists and engineers who are interested in the formal models and technical development of specific issues. Practitioners can learn about critical aspects that must be taken into account when designing and implementing databases supporting temporal information. Lecturers may find this book useful for an advanced course on databases. Moreover, any graduate student working on time representation and reasoning, either in data or knowledge bases, should definitely read it.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Hardcover, 2006 ed.)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R3,015 Discovery Miles 30 150 Ships in 10 - 15 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Database Systems for Advanced Applications - 21st International Conference, DASFAA 2016, Dallas, TX, USA, April 16-19, 2016,... Database Systems for Advanced Applications - 21st International Conference, DASFAA 2016, Dallas, TX, USA, April 16-19, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Shamkant B. Navathe, Weili Wu, Shashi Shekhar, Xiaoyong Du, X.Sean Wang, …
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

This two volume set LNCS 9642 and LNCS 9643 constitutes the refereed proceedings of the 21st International Conference on Database Systems for Advanced Applications, DASFAA 2016, held in Dallas, TX, USA, in April 2016. The 61 full papers presented were carefully reviewed and selected from a total of 183 submissions. The papers cover the following topics: crowdsourcing, data quality, entity identification, data mining and machine learning, recommendation, semantics computing and knowledge base, textual data, social networks, complex queries, similarity computing, graph databases, and miscellaneous, advanced applications.

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R3,839 Discovery Miles 38 390 Ships in 10 - 15 working days

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Top Gun: Maverick
Tom Cruise, Miles Teller, … DVD  (1)
R156 Discovery Miles 1 560
Peptine Pro Equine Hydrolysed Collagen…
 (2)
R359 R279 Discovery Miles 2 790
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Barbie
Margot Robbie, Ryan Gosling, … DVD R310 R194 Discovery Miles 1 940
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Bestway Spiderman Swim Ring (Diameter…
R48 Discovery Miles 480
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R24 R22 Discovery Miles 220
Maped Smiling Planet Scissor Vivo - on…
R26 Discovery Miles 260
Alva 5-Piece Roll-Up BBQ/ Braai Tool Set
R389 R346 Discovery Miles 3 460
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950

 

Partners