Pular para o conteúdo
Library Home
Start Over
Research Databases
E-Journals
Bibliografia Recomendada
Library Home
Entrar
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Idioma
Library Catalog
Todos os campos
Título
Autor
Assunto
Número de Chamada
ISBN/ISSN
Buscar
Busca Avançada
|
Navegar
|
Dicas de Busca
Moving Target Defense
Citar
Enviar por SMS
Enviar por e-mail
Imprimir
Exportar registro
Exportar para RefWorks
Exportar para EndNoteWeb
Exportar para EndNote
Salvar na lista
Link permanente
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats / edited by Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang.
Na minha lista:
Detalhes bibliográficos
Autor Corporativo:
SpringerLink (Online service)
Outros Autores:
Jajodia, Sushil
(Editor)
,
Ghosh, Anup K.
(Editor)
,
Swarup, Vipin
(Editor)
,
Wang, Cliff
(Editor)
,
Wang, X. Sean
(Editor)
Formato:
livro eletrônico
Idioma:
English
Publicado em:
New York, NY :
Springer New York : Imprint: Springer,
2011.
Edição:
1st ed. 2011.
coleção:
Advances in Information Security,
54
Springer eBook Collection.
Assuntos:
Computer security.
Data encryption (Computer science).
Application software.
Computer communication systems.
Computers.
Electronic resources (E-books)
Acesso em linha:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Itens
Descrição
Sumário
Registros relacionados
Registro fonte
Registros relacionados
Cyber Defense and Situational Awareness
Publicado em: (2014)
Moving Target Defense II Application of Game Theory and Adversarial Modeling
Publicado em: (2013)
Insider Threats in Cyber Security
Publicado em: (2010)
Vulnerability Analysis and Defense for the Internet
Publicado em: (2008)
Cyber Warfare Building the Scientific Foundation
Publicado em: (2015)
Cyber Security Deterrence and IT Protection for Critical Infrastructures
Publicado em: (2013)
Cyber Deception Building the Scientific Foundation
Publicado em: (2016)
From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
Publicado em: (2018)
Insider Attack and Cyber Security Beyond the Hacker
Publicado em: (2008)
Botnet Detection Countering the Largest Security Threat
Publicado em: (2008)
Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers
Publicado em: (2018)
Theory and Models for Cyber Situation Awareness
Publicado em: (2017)
Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
Publicado em: (2019)
Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches
por: Al-Shaer, Ehab, et al.
Publicado em: (2016)
Introduction to Cyberdeception
por: Rowe, Neil C., et al.
Publicado em: (2016)
Security and the Networked Society
por: Gregory, Mark A., et al.
Publicado em: (2013)
Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings
Publicado em: (2007)
Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense
por: Heckman, Kristin E., et al.
Publicado em: (2015)
Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings
Publicado em: (2018)
Network Intrusion Detection and Prevention Concepts and Techniques
por: Ghorbani, Ali A., et al.
Publicado em: (2010)
ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings
Publicado em: (2016)
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
Publicado em: (2013)
Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papers
Publicado em: (2013)
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers
Publicado em: (2013)
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I
Publicado em: (2019)
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part II
Publicado em: (2019)
Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
Publicado em: (2017)
Cyber Situational Awareness Issues and Research
Publicado em: (2010)
Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
Publicado em: (2019)
Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers
Publicado em: (2019)
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
Publicado em: (2019)
Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
Publicado em: (2017)
Data and Applications Security and Privacy XXXI 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings
Publicado em: (2017)
Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings
Publicado em: (2018)
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
Publicado em: (2019)
Spyware and Adware
por: Aycock, John
Publicado em: (2011)
Secure Multi-Party Non-Repudiation Protocols and Applications
por: Onieva, José A., et al.
Publicado em: (2009)
Privacy-Respecting Intrusion Detection
por: Flegel, Ulrich
Publicado em: (2007)
Global Initiatives to Secure Cyberspace An Emerging Landscape
Publicado em: (2009)
Intrusion Detection Systems
Publicado em: (2008)
Anterior
Seguinte
Registros relacionados
Cyber Defense and Situational Awareness
Publicado em: (2014)
Moving Target Defense II Application of Game Theory and Adversarial Modeling
Publicado em: (2013)
Insider Threats in Cyber Security
Publicado em: (2010)
Vulnerability Analysis and Defense for the Internet
Publicado em: (2008)
Cyber Warfare Building the Scientific Foundation
Publicado em: (2015)