Saltar al contenido
Library Home
Start Over
Research Databases
E-Journals
Reservas de Curso
Library Home
Entrar
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Lenguaje
Library Catalog
Todos los Campos
Título
Autor
Materia
Número de Clasificación
ISBN/ISSN
Buscar
Búsqueda Avanzada
|
Revisar
|
Consejos de búsqueda
Moving Target Defense
Citar
Describir
Enviar este por Correo electrónico
Imprimir
Exportar Registro
Exportar a RefWorks
Exportar a EndNoteWeb
Exportar a EndNote
Agregar a favoritos
Enlace Permanente
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats / edited by Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang.
Guardado en:
Detalles Bibliográficos
Autor Corporativo:
SpringerLink (Online service)
Otros Autores:
Jajodia, Sushil
(Editor)
,
Ghosh, Anup K.
(Editor)
,
Swarup, Vipin
(Editor)
,
Wang, Cliff
(Editor)
,
Wang, X. Sean
(Editor)
Formato:
eBook
Lenguaje:
English
Publicado:
New York, NY :
Springer New York : Imprint: Springer,
2011.
Edición:
1st ed. 2011.
Colección:
Advances in Information Security,
54
Springer eBook Collection.
Materias:
Computer security.
Data encryption (Computer science).
Application software.
Computer communication systems.
Computers.
Electronic resources (E-books)
Acceso en línea:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Existencias
Descripción
Tabla de Contenidos
Ejemplares similares
Vista Equipo
Ejemplares similares
Cyber Defense and Situational Awareness
Publicado: (2014)
Moving Target Defense II Application of Game Theory and Adversarial Modeling
Publicado: (2013)
Insider Threats in Cyber Security
Publicado: (2010)
Vulnerability Analysis and Defense for the Internet
Publicado: (2008)
Cyber Warfare Building the Scientific Foundation
Publicado: (2015)
Cyber Security Deterrence and IT Protection for Critical Infrastructures
Publicado: (2013)
Cyber Deception Building the Scientific Foundation
Publicado: (2016)
From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
Publicado: (2018)
Insider Attack and Cyber Security Beyond the Hacker
Publicado: (2008)
Botnet Detection Countering the Largest Security Threat
Publicado: (2008)
Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers
Publicado: (2018)
Theory and Models for Cyber Situation Awareness
Publicado: (2017)
Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
Publicado: (2019)
Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches
por: Al-Shaer, Ehab, et al.
Publicado: (2016)
Introduction to Cyberdeception
por: Rowe, Neil C., et al.
Publicado: (2016)
Security and the Networked Society
por: Gregory, Mark A., et al.
Publicado: (2013)
Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings
Publicado: (2007)
Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense
por: Heckman, Kristin E., et al.
Publicado: (2015)
Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings
Publicado: (2018)
Network Intrusion Detection and Prevention Concepts and Techniques
por: Ghorbani, Ali A., et al.
Publicado: (2010)
ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings
Publicado: (2016)
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
Publicado: (2013)
Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papers
Publicado: (2013)
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers
Publicado: (2013)
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I
Publicado: (2019)
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part II
Publicado: (2019)
Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
Publicado: (2017)
Cyber Situational Awareness Issues and Research
Publicado: (2010)
Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
Publicado: (2019)
Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers
Publicado: (2019)
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
Publicado: (2019)
Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
Publicado: (2017)
Data and Applications Security and Privacy XXXI 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings
Publicado: (2017)
Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings
Publicado: (2018)
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
Publicado: (2019)
Spyware and Adware
por: Aycock, John
Publicado: (2011)
Secure Multi-Party Non-Repudiation Protocols and Applications
por: Onieva, José A., et al.
Publicado: (2009)
Privacy-Respecting Intrusion Detection
por: Flegel, Ulrich
Publicado: (2007)
Global Initiatives to Secure Cyberspace An Emerging Landscape
Publicado: (2009)
Intrusion Detection Systems
Publicado: (2008)
Anterior
Siguiente
Ejemplares similares
Cyber Defense and Situational Awareness
Publicado: (2014)
Moving Target Defense II Application of Game Theory and Adversarial Modeling
Publicado: (2013)
Insider Threats in Cyber Security
Publicado: (2010)
Vulnerability Analysis and Defense for the Internet
Publicado: (2008)
Cyber Warfare Building the Scientific Foundation
Publicado: (2015)