Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • [Erscheinungsort nicht ermittelbar] : Auerbach Publications
  • Computer networks ; Security measures  (2)
  • Computer software Development  (2)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    ISBN: 9781439876633
    Language: English
    Pages: 1 online resource (183 pages)
    Edition: 1st edition
    DDC: 005.1
    Keywords: Computer software Development ; Software engineering ; Systems integration ; Software architecture ; Electronic books ; local ; Génie logiciel ; Architecture logicielle ; Systems integration ; Software engineering ; Software architecture ; Computer software ; Development
    Abstract: Before software engineering builds and installations can be implemented into software and/or systems integrations in military and aerospace programs, a comprehensive understanding of the software development life cycle is required. Covering all the development life cycle disciplines, Effective Methods for Software and Systems Integration explains h
    Note: Online resource; Title from title page (viewed April 19, 2016) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781466580596 , 1466580593
    Language: English
    Pages: 1 online resource (152 pages)
    Edition: 1st.
    Keywords: Access control ; Computer networks Access control ; Computer networks Security measures ; Computer security ; Computers Access control ; Data protection ; Computer Security ; Protection de l'information (Informatique) ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Sécurité informatique ; Réseaux d'ordinateurs ; Accès ; Contrôle ; Ordinateurs ; Accès ; Contrôle ; Computer networks ; Access control ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Data protection
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    ISBN: 9781466502338
    Language: English
    Pages: 1 online resource (528 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    DDC: 004.67/82
    Keywords: Cloud computing ; Software architecture ; Computer software Development ; Electronic books ; local ; Infonuagique ; Architecture logicielle ; Cloud computing ; Computer software ; Development ; Software architecture
    Abstract: Cloud Enterprise Architecture examines enterprise architecture (EA) in the context of the surging popularity of Cloud computing. It explains the different kinds of desired transformations the architectural blocks of EA undergo in light of this strategically significant convergence. Chapters cover each of the contributing architectures of EA-busines
    Note: Online resource; Title from title page (viewed October 24, 2012)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...