Libros importados con hasta 50% OFF + Envío Gratis a todo USA  Ver más

menú

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (en Inglés)
Formato
Libro Físico
Idioma
Inglés
N° páginas
96
Encuadernación
Tapa Blanda
Dimensiones
23.4 x 15.6 x 0.5 cm
Peso
0.15 kg.
ISBN13
9788793102965

Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (en Inglés)

Kotenko, Igor ; Markowsky, George (Autor) · River Publishers · Tapa Blanda

Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (en Inglés) - Kotenko, Igor ; Markowsky, George

Libro Físico

$ 45.71

$ 57.14

Ahorras: $ 11.43

20% descuento
  • Estado: Nuevo
Se enviará desde nuestra bodega entre el Lunes 03 de Junio y el Martes 04 de Junio.
Lo recibirás en cualquier lugar de Estados Unidos entre 1 y 3 días hábiles luego del envío.

Reseña del libro "Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (en Inglés)"

Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face. The papers in this issue are: - "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years. - "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations. - "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne ́c ̆ka, Peter Hanác ̆ek and Matej Kac ̆ic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software. - "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection. - "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.

Opiniones del libro

Ver más opiniones de clientes
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Preguntas frecuentes sobre el libro

Todos los libros de nuestro catálogo son Originales.
El libro está escrito en Inglés.
La encuadernación de esta edición es Tapa Blanda.

Preguntas y respuestas sobre el libro

¿Tienes una pregunta sobre el libro? Inicia sesión para poder agregar tu propia pregunta.

Opiniones sobre Buscalibre

Ver más opiniones de clientes