0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security (Hardcover, 1st ed. 2020): Jiangxing Wu Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security (Hardcover, 1st ed. 2020)
Jiangxing Wu
R5,602 Discovery Miles 56 020 Ships in 10 - 15 working days

This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.

Future Network Architectures and Core Technologies (Hardcover): Ju-long Lan, Yu-xiang Hu, Zhen Zhang, Yi-ming Jiang, Peng Wang,... Future Network Architectures and Core Technologies (Hardcover)
Ju-long Lan, Yu-xiang Hu, Zhen Zhang, Yi-ming Jiang, Peng Wang, …
R3,775 Discovery Miles 37 750 Ships in 10 - 15 working days

This book introduces the background, basic concepts and evolution of computer network development; by comparing and contrasting with the typical network architectures in the market. The book focuses on the architecture and underpinning technologies towards the future in network designs. It also provides a reconfigurable evolutionary network function innovation platform for researches to run experiments on the networks they designed. The contents of this book are novel, informative, and practical — a reflection of the state-of-art development in network architecture. This book is written for engineers and researchers specializing in communications or computer networks. It could also be adopted as a textbook for graduate students majoring in communications, computing, and computer network related disciplines in colleges and universities.

Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security (Paperback, 1st ed. 2020): Jiangxing Wu Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security (Paperback, 1st ed. 2020)
Jiangxing Wu
R5,572 Discovery Miles 55 720 Ships in 10 - 15 working days

This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ergo Mouse Pad Wrist Rest Support
R399 R349 Discovery Miles 3 490
Pokémon Encyclopedia Updated and…
Pokémon Hardcover R470 R376 Discovery Miles 3 760
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn Paperback R280 R210 Discovery Miles 2 100
Air Fryer - Herman's Top 100 Recipes
Herman Lensing Paperback R350 R235 Discovery Miles 2 350
The Faraway Tree Adventures - 10-Book…
Enid Blyton Paperback R1,050 R923 Discovery Miles 9 230
Leisure Quip Stainless Steel Tumbler…
R39 R21 Discovery Miles 210
Konix Naruto Gamepad for Nintendo Switch…
R699 R599 Discovery Miles 5 990
Bostik Clear Gel in Box (25ml)
R40 R23 Discovery Miles 230
Zap! Polymer Clay Jewellery
Kit R250 R119 Discovery Miles 1 190

 

Partners