Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems / Najlacnejšie knihy
Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems

Code: 09010158

Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems

by Igor Kotenko, George Markowsky

Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of s ... more

49.80


In stock at our supplier
Shipping in 15 - 20 days
Add to wishlist

You might also like

Give this book as a present today
  1. Order book and choose Gift Order.
  2. We will send you book gift voucher at once. You can give it out to anyone.
  3. Book will be send to donee, nothing more to care about.

Book gift voucher sampleRead more

More about Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems

You get 125 loyalty points

Book synopsis

Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face. The papers in this issue are: . "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years. . "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations. . "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne żc żka, Peter Hanác żek and Matej Kac żic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software. . "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection. . "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.

Book details

Book category Books in English Technology, engineering, agriculture Electronics & communications engineering Communications engineering / telecommunications

49.80

Trending among others



Collection points Bratislava a 2642 dalších

Copyright ©2008-24 najlacnejsie-knihy.sk All rights reservedPrivacyCookies


Account: Log in
Všetky knihy sveta na jednom mieste. Navyše za skvelé ceny.

Shopping cart ( Empty )

For free shipping
shop for 59,99 € and more

You are here: