서브메뉴
검색
상세정보
New solutions for cybersecurity
New solutions for cybersecurity
상세정보
- 자료유형
- 전자책(국외)
- 미국국회도서관 청구기호
- TK5105.59-.N3464 2018eb
- 자관 청구기호
- 표제와 책임표시사항
- New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentland.
- 발행, 배포, 간사 사항
- 형태사항
- 1 online resource.
- 총서사항
- MIT connections science & engineering
- 서지 등 주기
- Includes bibliographical references and index.
- 내용주기
- 완전내용Intro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risksa?#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholdersa?#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
- 내용주기
- 완전내용CHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISPa?#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
- 내용주기
- 완전내용CHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies
- 요약 등 주기
- 요약Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 부출표목-개인명
- 부출표목-개인명
- 부출표목-개인명
- 기타형태저록
- Print version New solutions for cybersecurity
- 전자적 위치 및 접속
- 링크정보보기
MARC
008180125s2018 mau sb 001 0 eng d■001MOKWON01237451
■003OCoLC
■00520190128092240
■006m d
■007cr cnu---unuuu
■008180125s2018 mau ob 001 0 eng d
■019 ▼a1021095171▼a1030718111▼a1030796424▼a1031331876▼a1031877365▼a1032573195▼a1032649761
■020 ▼a9780262346641▼q(electronic bk.)
■020 ▼a0262346648▼q(electronic bk.)
■020 ▼z9780262535373
■020 ▼z0262535378
■035 ▼a1694039▼b(N$T)
■035 ▼a(OCoLC)1020319459▼z(OCoLC)1021095171▼z(OCoLC)1030718111▼z(OCoLC)1030796424▼z(OCoLC)1031331876▼z(OCoLC)1031877365▼z(OCoLC)1032573195▼z(OCoLC)1032649761
■040 ▼aN$T▼beng▼erda▼epn▼cN$T▼dYDX▼dEBLCP▼dCOO▼dCNCGM▼dIDB▼dMNW▼dXUN▼dCEF
■049 ▼aMAIN
■050 4▼aTK5105.59▼b.N3464 2018eb
■072 7▼aBUS▼x082000▼2bisacsh
■072 7▼aBUS▼x041000▼2bisacsh
■072 7▼aBUS▼x042000▼2bisacsh
■072 7▼aBUS▼x085000▼2bisacsh
■08204▼a658.4/78▼223
■090 ▼a전자도서
■24500▼aNew solutions for cybersecurity▼cedited by Howard Shrobe, David L. Shrier, and Alex Pentland.
■260 ▼aCambridge, MA▼bMIT Press▼c[2018]
■300 ▼a1 online resource.
■336 ▼atext▼btxt▼2rdacontent
■337 ▼acomputer▼bc▼2rdamedia
■338 ▼aonline resource▼bcr▼2rdacarrier
■347 ▼atext file▼bPDF▼2rda
■347 ▼adata file▼2rda
■4900 ▼aMIT connections science & engineering
■504 ▼aIncludes bibliographical references and index.
■5050 ▼aIntro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risksa?#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholdersa?#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
■5058 ▼aCHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISPa?#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
■5058 ▼aCHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies
■520 ▼aExperts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
■5880 ▼aPrint version record.
■590 ▼aMaster record variable field(s) change: 050, 082, 650
■650 0▼aComputer networks▼xSecurity measures.
■650 0▼aInternet▼xSecurity measures.
■650 7▼aComputer networks▼xSecurity measures.▼2fast▼0(OCoLC)fst00872341
■650 7▼aInternet▼xSecurity measures.▼2fast▼0(OCoLC)fst01751426
■650 7▼aBUSINESS & ECONOMICS / Industrial Management▼2bisacsh
■650 7▼aBUSINESS & ECONOMICS / Management▼2bisacsh
■650 7▼aBUSINESS & ECONOMICS / Management Science▼2bisacsh
■650 7▼aBUSINESS & ECONOMICS / Organizational Behavior▼2bisacsh
■655 4▼aElectronic books.
■7001 ▼aShrobe, Howard E.▼eeditor.
■7001 ▼aShrier, David L.▼eeditor.
■7001 ▼aPentland, Alex▼d1952-▼eeditor.
■77608▼iPrint version▼tNew solutions for cybersecurity.▼dCambridge, MA : MIT Press, [2018]▼z9780262535373▼w(DLC) 2017040417▼w(OCoLC)1003255394
■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1694039
■938 ▼aEBL - Ebook Library▼bEBLB▼nEBL5240456
■938 ▼aYBP Library Services▼bYANK▼n15111609
■938 ▼aEBSCOhost▼bEBSC▼n1694039
■994 ▼a92▼bN$T
■999 ▼a길미정▼c길미정



한글
ENG
日本
中文
Việt Nam