|
|
Showing 1 - 1 of
1 matches in All Departments
Increasingly our critical infrastructures are reliant on computers.
We see examples of such infrastructures in several domains,
including medical, power, telecommunications, and finance. Although
automation has advantages, increased reliance on computers exposes
our critical infrastructures to a wider variety and higher
likelihood of accidental failures and malicious attacks. Disruption
of services caused by such undesired events can have catastrophic
effects, such as disruption of essential services and huge
financial losses. The increased reliance of critical services on
our cyberinfrastructure and the dire consequences of security
breaches have highlighted the importance of information security.
Authorization, security protocols, and software security are three
central areas in security in which there have been significant
advances in developing systematic foundations and analysis methods
that work for practical systems. This book provides an introduction
to this work, covering representative approaches, illustrated by
examples, and providing pointers to additional work in the area.
Table of Contents: Introduction / Foundations / Detecting Buffer
Overruns Using Static Analysis / Analyzing Security Policies /
Analyzing Security Protocols
|
You may like...
The Public
Alec Baldwin, Emilio Estevez, …
DVD
R216
Discovery Miles 2 160
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.