본문

서브메뉴

상세정보

New solutions for cybersecurity
New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentl...
New solutions for cybersecurity

상세정보

자료유형  
 전자책(국외)
미국국회도서관 청구기호  
TK5105.59-.N3464 2018eb
자관 청구기호  
표제와 책임표시사항  
New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentland.
발행, 배포, 간사 사항  
Cambridge, MA : MIT Press , [2018]
    형태사항  
    1 online resource.
    총서사항  
    MIT connections science & engineering
    서지 등 주기  
    Includes bibliographical references and index.
    내용주기  
    완전내용Intro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risksa?#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholdersa?#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
    내용주기  
    완전내용CHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISPa?#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
    내용주기  
    완전내용CHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies
    요약 등 주기  
    요약Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    부출표목-개인명  
    부출표목-개인명  
    부출표목-개인명  
    Pentland Alex , 1952-
      기타형태저록  
      Print version New solutions for cybersecurity
      전자적 위치 및 접속  
        링크정보보기

      MARC

       008180125s2018        mau          sb        001  0  eng  d
      ■001MOKWON01237451
      ■003OCoLC
      ■00520190128092240
      ■006m                d                
      ■007cr  cnu---unuuu
      ■008180125s2018        mau          ob        001  0  eng  d
      ■019    ▼a1021095171▼a1030718111▼a1030796424▼a1031331876▼a1031877365▼a1032573195▼a1032649761
      ■020    ▼a9780262346641▼q(electronic  bk.)
      ■020    ▼a0262346648▼q(electronic  bk.)
      ■020    ▼z9780262535373
      ■020    ▼z0262535378
      ■035    ▼a1694039▼b(N$T)
      ■035    ▼a(OCoLC)1020319459▼z(OCoLC)1021095171▼z(OCoLC)1030718111▼z(OCoLC)1030796424▼z(OCoLC)1031331876▼z(OCoLC)1031877365▼z(OCoLC)1032573195▼z(OCoLC)1032649761
      ■040    ▼aN$T▼beng▼erda▼epn▼cN$T▼dYDX▼dEBLCP▼dCOO▼dCNCGM▼dIDB▼dMNW▼dXUN▼dCEF
      ■049    ▼aMAIN
      ■050  4▼aTK5105.59▼b.N3464  2018eb
      ■072  7▼aBUS▼x082000▼2bisacsh
      ■072  7▼aBUS▼x041000▼2bisacsh
      ■072  7▼aBUS▼x042000▼2bisacsh
      ■072  7▼aBUS▼x085000▼2bisacsh
      ■08204▼a658.4/78▼223
      ■090    ▼a전자도서
      ■24500▼aNew  solutions  for  cybersecurity▼cedited  by  Howard  Shrobe,  David  L.  Shrier,  and  Alex  Pentland.
      ■260    ▼aCambridge,  MA▼bMIT  Press▼c[2018]
      ■300    ▼a1  online  resource.
      ■336    ▼atext▼btxt▼2rdacontent
      ■337    ▼acomputer▼bc▼2rdamedia
      ■338    ▼aonline  resource▼bcr▼2rdacarrier
      ■347    ▼atext  file▼bPDF▼2rda
      ■347    ▼adata  file▼2rda
      ■4900  ▼aMIT  connections  science  &  engineering
      ■504    ▼aIncludes  bibliographical  references  and  index.
      ■5050  ▼aIntro;  CONTENTS;  INTRODUCTION:  Cybersecurity  and  Society;  SECTION  I  MANAGEMENT,  ORGANIZATIONS  &  STRATEGY;  CHAPTER  1  Institutions  for  Cybersecurity:  International  Responses  and  Data  Sharing  Initiatives;  CHAPTER  2  Cybersafety:  A  Systems  Theory  Approach  to  Managing  Cybersecurity  Risksa?#x80;#x94;Applied  to  TJX  Cyberattack;  CHAPTER  3  Measuring  Stakeholdersa?#x80;#x99;  Perceptions  of  Cybersecurity  for  Renewable  Energy  Systems;  CHAPTER  4  Fixing  a  Hole:  The  Labor  Market  for  Bugs;  SECTION  II  ARCHITECTURE;  CHAPTER  5  Balancing  Disruption  and  Deployability  in  the  CHERI  Instruction-Set  Architecture  (ISA)
      ■5058  ▼aCHAPTER  6  Fundamental  Trustworthiness  Principles  in  CHERICHAPTER  7  ISPa?#x80;#x94;Hardware  Enforcement  of  Security  Policies;  CHAPTER  8  Stealing  Reality:  When  Criminals  Become  Data  Scientists;  CHAPTER  9  Moving  Target  Techniques:  Cyber  Resilience  through  Randomization,  Diversity,  and  Dynamism;  SECTION  III  SYSTEMS;  CHAPTER  10  Who's  Afraid  of  the  Dark  Web?;  CHAPTER  11  Social  Physics  and  Cybercrime;  CHAPTER  12  Behavioral  Biometrics;  CHAPTER  14  Owner  Centric  Access  Management  for  IoT  Data;  CHAPTER  15  Enigma:  Decentralized  Computation  Platform  with  Guaranteed  Privacy
      ■5058  ▼aCHAPTER  16  The  Trust::Data  Framework  as  a  Solution  to  the  Cybersecurity  ChallengeConclusion;  Contributor  Biographies
      ■520    ▼aExperts  from  MIT  explore  recent  advances  in  cybersecurity,  bringing  together  management,  technical,  and  sociological  perspectives.
      ■5880  ▼aPrint  version  record.
      ■590    ▼aMaster  record  variable  field(s)  change:  050,  082,  650
      ■650  0▼aComputer  networks▼xSecurity  measures.
      ■650  0▼aInternet▼xSecurity  measures.
      ■650  7▼aComputer  networks▼xSecurity  measures.▼2fast▼0(OCoLC)fst00872341
      ■650  7▼aInternet▼xSecurity  measures.▼2fast▼0(OCoLC)fst01751426
      ■650  7▼aBUSINESS  &  ECONOMICS  /  Industrial  Management▼2bisacsh
      ■650  7▼aBUSINESS  &  ECONOMICS  /  Management▼2bisacsh
      ■650  7▼aBUSINESS  &  ECONOMICS  /  Management  Science▼2bisacsh
      ■650  7▼aBUSINESS  &  ECONOMICS  /  Organizational  Behavior▼2bisacsh
      ■655  4▼aElectronic  books.
      ■7001  ▼aShrobe,  Howard  E.▼eeditor.
      ■7001  ▼aShrier,  David  L.▼eeditor.
      ■7001  ▼aPentland,  Alex▼d1952-▼eeditor.
      ■77608▼iPrint  version▼tNew  solutions  for  cybersecurity.▼dCambridge,  MA  :  MIT  Press,  [2018]▼z9780262535373▼w(DLC)    2017040417▼w(OCoLC)1003255394
      ■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1694039
      ■938    ▼aEBL  -  Ebook  Library▼bEBLB▼nEBL5240456
      ■938    ▼aYBP  Library  Services▼bYANK▼n15111609
      ■938    ▼aEBSCOhost▼bEBSC▼n1694039
      ■994    ▼a92▼bN$T
      ■999    ▼a길미정▼c길미정

      미리보기

      내보내기

      chatGPT토론

      Ai 추천 관련 도서


        신착도서 더보기
        관련도서 더보기
        최근 3년간 통계입니다.
        SMS 발송 간략정보 이동 상세정보출력

        소장정보

        • 예약
        • 서가에 없는 책 신고
        • 자료배달서비스
        • 나의폴더
        • 우선정리요청
        소장자료
        등록번호 청구기호 소장처 대출가능여부 대출정보
        EM079161 EB  전자도서 자료대출실(3층) 온라인이용가능 온라인이용가능
        마이폴더

        * 대출중인 자료에 한하여 예약이 가능합니다. 예약을 원하시면 예약버튼을 클릭하십시오.

        해당 도서를 다른 이용자가 함께 대출한 도서

        관련도서

        관련 인기도서

        서평쓰기

        도서위치

        AiBot !!
        CH