Trusted Recovery and Defensive Information Warfare

Peng Liu

ISBN 10: 0792375726 ISBN 13: 9780792375722
Edité par Springer US, Springer New York Nov 2001, 2001
Neuf(s) Buch

Vendeur buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Vendeur AbeBooks depuis 23 janvier 2017


A propos de cet article

Description :

This item is printed on demand - Print on Demand Titel. Neuware -Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system.Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions.Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications.Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 152 pp. Englisch. N° de réf. du vendeur 9780792375722

Signaler cet article

Synopsis :

Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system.
Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions.
Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications.
Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security.

À propos de l?auteur: Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

Détails bibliographiques

Titre : Trusted Recovery and Defensive Information ...
Éditeur : Springer US, Springer New York Nov 2001
Date d'édition : 2001
Reliure : Buch
Etat : Neu

Meilleurs résultats de recherche sur AbeBooks

Image fournie par le vendeur

Peng, Liu:
Edité par Boston, Kluwer Acad. Publ, 2002
ISBN 10 : 0792375726 ISBN 13 : 9780792375722
Ancien ou d'occasion Couverture rigide

Vendeur : Antiquariat Bookfarm, Löbnitz, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Hardcover. 133 S. Ehem. Bibliotheksexemplar mit Signatur und Stempel. GUTER Zustand, ein paar Gebrauchsspuren. Ex-library with stamp and library-signature. GOOD condition, some traces of use. 9780792375722 Sprache: Englisch Gewicht in Gramm: 550. N° de réf. du vendeur 2340734

Contacter le vendeur

Acheter D'occasion

EUR 92,20
Expédition à EUR 40
Expédition depuis Allemagne vers Etats-Unis

Quantité disponible : 1 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Liu, Peng; Jajodia, Sushil
Edité par Springer, 2001
ISBN 10 : 0792375726 ISBN 13 : 9780792375722
Neuf Couverture rigide

Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 269545-n

Contacter le vendeur

Acheter neuf

EUR 111,44
Expédition à EUR 17,15
Expédition depuis Royaume-Uni vers Etats-Unis

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Peng Liu; Jajodia, Sushil
Edité par Springer, 2001
ISBN 10 : 0792375726 ISBN 13 : 9780792375722
Neuf Couverture rigide

Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. In. N° de réf. du vendeur ria9780792375722_new

Contacter le vendeur

Acheter neuf

EUR 111,46
Expédition à EUR 13,70
Expédition depuis Royaume-Uni vers Etats-Unis

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Peng Liu|Sushil Jajodia
Edité par Springer US, 2001
ISBN 10 : 0792375726 ISBN 13 : 9780792375722
Neuf Couverture rigide

Vendeur : moluna, Greven, Allemagne

Évaluation du vendeur 4 sur 5 étoiles Evaluation 4 étoiles, En savoir plus sur les évaluations des vendeurs

Gebunden. Etat : New. Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USAInformation security concerns the. N° de réf. du vendeur 5970263

Contacter le vendeur

Acheter neuf

EUR 118,64
Expédition à EUR 48,99
Expédition depuis Allemagne vers Etats-Unis

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Liu, Peng; Jajodia, Sushil
Edité par Springer, 2001
ISBN 10 : 0792375726 ISBN 13 : 9780792375722
Ancien ou d'occasion Couverture rigide

Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 269545

Contacter le vendeur

Acheter D'occasion

EUR 119,86
Expédition à EUR 2,23
Expédition nationale : Etats-Unis

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Liu, Peng; Jajodia, Sushil
Edité par Springer, 2001
ISBN 10 : 0792375726 ISBN 13 : 9780792375722
Ancien ou d'occasion Couverture rigide

Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 269545

Contacter le vendeur

Acheter D'occasion

EUR 126,06
Expédition à EUR 17,15
Expédition depuis Royaume-Uni vers Etats-Unis

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Liu, Peng; Jajodia, Sushil
Edité par Springer, 2001
ISBN 10 : 0792375726 ISBN 13 : 9780792375722
Neuf Couverture rigide

Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 269545-n

Contacter le vendeur

Acheter neuf

EUR 126,12
Expédition à EUR 2,23
Expédition nationale : Etats-Unis

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Peng Liu
Edité par Springer Us Nov 2001, 2001
ISBN 10 : 0792375726 ISBN 13 : 9780792375722
Neuf Couverture rigide

Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Buch. Etat : Neu. Neuware - Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions. Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications. Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security. N° de réf. du vendeur 9780792375722

Contacter le vendeur

Acheter neuf

EUR 162,93
Expédition à EUR 62
Expédition depuis Allemagne vers Etats-Unis

Quantité disponible : 1 disponible(s)

Ajouter au panier