0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Automated Security Management (Hardcover, 2013 ed.): Ehab Al-Shaer, Xinming Ou, Geoffrey Xie Automated Security Management (Hardcover, 2013 ed.)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R3,119 R1,931 Discovery Miles 19 310 Save R1,188 (38%) Ships in 12 - 17 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013): Ehab Al-Shaer, Xinming Ou, Geoffrey... Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,046 Discovery Miles 20 460 Out of stock

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Quantitative Security Risk Assessment of Enterprise Networks (Paperback, 2011 ed.): Xinming Ou, Anoop Singhal Quantitative Security Risk Assessment of Enterprise Networks (Paperback, 2011 ed.)
Xinming Ou, Anoop Singhal
R1,649 R592 Discovery Miles 5 920 Save R1,057 (64%) Out of stock

Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as "are we more secure than yesterday" or "how does the security of one network configuration compare with another one". In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
I Write What l Like
Steve Biko Paperback R250 R195 Discovery Miles 1 950
Sensation, Contemporary Poetry and…
Jon Clay Hardcover R4,199 Discovery Miles 41 990
The New American Poetry and Cold War…
Stephan Delbos Hardcover R3,514 Discovery Miles 35 140
Ursula K. Le Guin's "A Wizard of…
Timothy S. Miller Hardcover R1,272 Discovery Miles 12 720
Die Singende Hand - Versamelde Gedigte…
Breyten Breytenbach Paperback R399 R343 Discovery Miles 3 430
The Concept of the Game in American…
Sandra Schenk Hardcover R2,121 Discovery Miles 21 210
Joseph Conrad and Postcritique…
Jay Parker, Joyce Wexler Hardcover R3,856 Discovery Miles 38 560
Robert Holdstock's Mythago Wood - A…
Paul Kincaid Hardcover R1,279 Discovery Miles 12 790
Gender, Race, and Mourning in American…
Greg Forter Hardcover R2,678 R2,392 Discovery Miles 23 920
Modernism, Theory, and Responsible…
Stephen Ross Hardcover R3,350 Discovery Miles 33 500

 

Partners