0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Automated Security Management (Hardcover, 2013 ed.): Ehab Al-Shaer, Xinming Ou, Geoffrey Xie Automated Security Management (Hardcover, 2013 ed.)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R3,119 R1,931 Discovery Miles 19 310 Save R1,188 (38%) Ships in 12 - 17 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013): Ehab Al-Shaer, Xinming Ou, Geoffrey... Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,046 Discovery Miles 20 460 Out of stock

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Quantitative Security Risk Assessment of Enterprise Networks (Paperback, 2011 ed.): Xinming Ou, Anoop Singhal Quantitative Security Risk Assessment of Enterprise Networks (Paperback, 2011 ed.)
Xinming Ou, Anoop Singhal
R1,649 R592 Discovery Miles 5 920 Save R1,057 (64%) Out of stock

Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as "are we more secure than yesterday" or "how does the security of one network configuration compare with another one". In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pure Pleasure Electric Heating Pad (30 x…
 (2)
R599 R529 Discovery Miles 5 290
Bostik Glu Tape
R38 Discovery Miles 380
Croxley Create Wood Free Pencil Crayons…
R12 Discovery Miles 120
Snappy Tritan Bottle (1.5L)(Green)
R229 R180 Discovery Miles 1 800
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,245 Discovery Miles 22 450
The Lion King - Blu-Ray + DVD
Blu-ray disc R344 Discovery Miles 3 440
Snappy Tritan Bottle (1.2L)(Blue)
 (2)
R239 R169 Discovery Miles 1 690
Brother LX27NT Portable Free Arm Sewing…
 (1)
R3,999 R2,999 Discovery Miles 29 990
Bostik Paper Glue - Clear (118ml)
R30 Discovery Miles 300
6mm Yoga Mat & Carry Bag [Blue]
R191 Discovery Miles 1 910

 

Partners