This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.
An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced, .
This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It's also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Ehab Al-Shaer is a Professor and the Director of the Cyber Defense and Network Assurability (CyberDNA) Center in the School of Computing and Informatics at University of North Carolina Charlotte. His primary research areas are network security, security management, fault diagnosis, and network assurability. Prof. Al-Shaer edited/co-edited more than 10 books and book chapters, and published about 100 refereed journals and conferences papers in his area. Prof. Al-Shaer is the General Chair of ACM Computer and Communication 2009-2010 and NSF Workshop in Assurable and Usable Security Configuration, August 2008. Prof. Al-Shaer also served as a Workshop Chair and Program Co-chair for number of well-established conferences/workshops in his area including POLICY 2008, IM 2007, ANM-INFOCOM 2008, CCS-SafeConfig 09, MMNS 2001, and E2EMON 04-05. He also served as a member in the technical program and organization committees for many IEEE and ACM conferences. He was awarded many Best Paper Awards.Prof. Al-Shaer received his MSc and Ph.D. in Computer Science from the Northeastern University (Boston, MA) and Old Dominion University (Norfolk, VA) in 1998 and 1994 respectively.
Dr. Jinpeng Wei leads the Systems Security Lab in the Department of Software and Information Systems at UNC Charlotte. His research focuses on theory, methods, and tools that enhance the security of systems software for a wide range of applications. His research topics include systems software vulnerability detection and mitigation, runtime verification of systems software security properties, stealthy malware detection, analysis and defense, secure software architecture, cloud computing security, and security problems in emerging application domains such as Internet of Things. His work has been published in premier venues such as ACSAC, ESORICS, Computers & Security, USENIX FAST, and USENIX ATC. He is the winner of three best paper awards and the AFRL Visiting Faculty Research Program (VFRP) award. His research has been funded by Air Force Research Lab, Department of Homeland Security, Department of Defense, Centre for Strategic Infocomm Technologies (CSIT), Singapore, and Electronics and Telecommunications Research Institute (ETRI). He has been a program committee member for more than 20 conferences (such as SecureComm 2014, IEEE CLOUD 2015, and ICDCS 2011), the Workshop Co-Chair of CollaborateCom 2014, and a reviewer for reputable journals such as ACM Computing Surveys, ACM Transactions on Computer Systems, Elsevier Journal of Computers and Security, and IEEE Transactions on Dependable and Secure Computing. Dr. Wei received a PhD in Computer Science from Georgia Institute of Technology, and prior to his appointment at UNC Charlotte he was a faculty member in the School of Computing and Information Sciences, Florida International University.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 30 expédition depuis Allemagne vers Etats-Unis
Destinations, frais et délaisEUR 2,27 expédition vers Etats-Unis
Destinations, frais et délaisVendeur : Universitätsbuchhandlung Herta Hold GmbH, Berlin, Allemagne
23.5 cm x 15.5 cm, 547 g. XVI, 235 p. Hardcover. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Sprache: Englisch. N° de réf. du vendeur 9165JB
Quantité disponible : 4 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 33769597-n
Quantité disponible : 2 disponible(s)
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
HRD. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur GB-9783030021092
Quantité disponible : 1 disponible(s)
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
HRD. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur GB-9783030021092
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 33769597
Quantité disponible : 2 disponible(s)
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
Etat : New. N° de réf. du vendeur ABLIING23Mar3113020002828
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 33769597-n
Quantité disponible : 2 disponible(s)
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9783030021092_new
Quantité disponible : Plus de 20 disponibles
Vendeur : Chiron Media, Wallingford, Royaume-Uni
Hardcover. Etat : New. N° de réf. du vendeur 6666-GRD-9783030021092
Quantité disponible : 1 disponible(s)
Vendeur : Grand Eagle Retail, Mason, OH, Etats-Unis
Hardcover. Etat : new. Hardcover. This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced, This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. Its also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9783030021092
Quantité disponible : 1 disponible(s)