0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Automated Security Management (Hardcover, 2013 ed.): Ehab Al-Shaer, Xinming Ou, Geoffrey Xie Automated Security Management (Hardcover, 2013 ed.)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,997 R1,893 Discovery Miles 18 930 Save R1,104 (37%) Ships in 12 - 17 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013): Ehab Al-Shaer, Xinming Ou, Geoffrey... Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,064 Discovery Miles 20 640 Ships in 10 - 15 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Quantitative Security Risk Assessment of Enterprise Networks (Paperback, 2011 ed.): Xinming Ou, Anoop Singhal Quantitative Security Risk Assessment of Enterprise Networks (Paperback, 2011 ed.)
Xinming Ou, Anoop Singhal
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as "are we more secure than yesterday" or "how does the security of one network configuration compare with another one". In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Nexus Plugtop Solid 3Pin (16A) (White )
R49 R25 Discovery Miles 250
Vital BabyŽ HYDRATE™ Easy Sipper™ Cup…
R158 R149 Discovery Miles 1 490
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Uglies
Scott Westerfeld Paperback R265 R75 Discovery Miles 750
Cricut Explore Air 2 Machine
 (1)
R5,349 R3,783 Discovery Miles 37 830
Dunlop Pro Padel Balls (Green)(Pack of…
R199 R165 Discovery Miles 1 650
Lucky Plastic 3-in-1 Nose Ear Trimmer…
R289 Discovery Miles 2 890
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Magic Mike's Last Dance
Channing Tatum, Salma Hayek-Pinault DVD R93 Discovery Miles 930

 

Partners