ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب The science of cybersecurity and a roadmap to research

دانلود کتاب علم امنیت سایبری و نقشه راهی برای تحقیق

The science of cybersecurity and a roadmap to research

مشخصات کتاب

The science of cybersecurity and a roadmap to research

ویرایش:  
نویسندگان:   
سری: Defense, Security and Strategy 
ISBN (شابک) : 1612098266, 9781611223620 
ناشر: Nova Science Publishers, Inc. 
سال نشر: 2011 
تعداد صفحات: 208 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 3 مگابایت 

قیمت کتاب (تومان) : 31,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 14


در صورت تبدیل فایل کتاب The science of cybersecurity and a roadmap to research به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب علم امنیت سایبری و نقشه راهی برای تحقیق نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب علم امنیت سایبری و نقشه راهی برای تحقیق

فناوری اطلاعات از هر نظر فراگیر شده است، از تلفن‌ها و سایر دستگاه‌های کوچک گرفته تا شبکه‌های سازمانی و زیرساخت‌هایی که اقتصاد ما را اداره می‌کند. از آنجایی که زیرساخت های حیاتی ایالات متحده بیش از پیش به شبکه های عمومی و خصوصی وابسته شده اند، پتانسیل تأثیرات گسترده ملی ناشی از اختلال یا شکست این شبکه ها نیز افزایش یافته است. ایمن سازی زیرساخت های حیاتی کشور مستلزم محافظت نه تنها از سیستم های فیزیکی آنها، بلکه به همان اندازه مهم، از بخش های سایبری سیستم هایی است که آنها به آنها متکی هستند. این کتاب به بررسی نقشه راه تحقیقات امنیت سایبری می پردازد تا یک دستور کار تحقیق و توسعه ملی را تعریف کند که ما را قادر می سازد تا از دشمنان خود پیشی بگیریم و فناوری هایی را تولید کنیم که از سیستم ها و شبکه های اطلاعاتی ما در آینده محافظت می کنند.


توضیحاتی درمورد کتاب به خارجی

Information technology has become pervasive in every way, from our phones and other small devices to our enterprise networks to the infrastructure that runs our economy. As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation's critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. This book examines the cybersecurity research roadmap in order to define a national R&D agenda that is required to enable us to get ahead of our adversaries and produce the technologies that will protect our information systems and networks into the future.



فهرست مطالب

Library of Congress Cataloging-in-Publication Data
Contents
Preface
Science of Cybersecurity
	Abstract
	1. executive Summary
	2. Problem Statement and Introduction
	3. Cyber-Security as Science - An Overview
		3.1. Attributes for Cyber-Security
		3.2. Guidance from other Sciences
			3.2.1. Economics
			3.2.2. Meteorology
			3.2.3. Medicine
			3.2.4. Astronomy
			3.2.5. Agriculture
		3.3. Security Degrades Over Time
			3.3.1. Unix passwords
			3.3.2. Lock bumping
		3.4. The Role of Secrecy
		3.5. Aspects of the Science of Cyber-Security
		3.6. Some Science
			3.6.1. Trust
			3.6.2. Cryptography
			3.6.3. Game theory
			3.6.4. Model checking
			3.6.5. Obfuscation
			3.6.6. Machine learning
			3.6.7. Composition of components
		3.7. Applying the Fruits of Science
		3.8. Metrics
		3.9. The Opportunities of New Technologies
		3.10. Experiments and Data
	4. Model Checking
		4.1. Brief Introduction to Spin and Promela
		4.2. Application to Security
			4.2.1. The Needham-Schroeder Protocol
			4.2.2. Promela model of the protocol
		4.3. Scaling Issues
		4.4. Extracting Models from Code
		4.5. Relationship to Hyper-Properties
	5. The Immune System Analogy
		5.1. Basic Biology
		5.2. Learning from the Analogy
			5.2.1. The need for adaptive response
			5.2.2. A mix of sensing modalities
			5.2.3. The need for controlled experiments
			5.2.4. Time scale differences
			5.2.5. Responses to detection
			5.2.6. Final points
	6. Conclusions and Recommendations
	A. Appendix: Briefers
	References
A Roadmap for Cybersecurity Research
	Executive Summary
	Introduction
		Historical Background
		Current Context
		Document Format
			Background
			Future Directions
	Acknowledgments
	Current Hard Problems in INFOSEC Research
		1. Scalable Trustworthy Systems
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of the practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide this topic?
				What are the major research gaps?
					Near term
					Medium term
					Long term
				What are the challenges that must be addressed?
				What approaches might be desirable?
				What R&D is evolutionary and what is more basic, higher risk, game changing?
				Resources
				Measures of success
				What needs to be in place for test and evaluation?
				To what extent can we test real systems?
		2. Enterprise-Level Metrics (ELMs)
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of the practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide this topic?
					Definition
					Collection
					Analysis
					Composition
					Adoption
				What are the major research gaps?
				What are some exemplary problems for R&D on this topic?
				What R&D is evolutionary, and what is more basic, higher risk, game changing?
				Resources
				Measures of success
				What needs to be in place for test and evaluation?
				To what extent can we test real systems?
		3. System Evaluation Life Cycle
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of the practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide this topic?
					Requirements
					Design
					Development and Implementation
					Testing
					Deployment and Operations
					Decommissioning
				What are the major research gaps?
				What are some exemplary problems for R&D on this topic?
				What R&D is evolutionary, and what is more basic, higher risk, game changing?
				Resources
				Measures of success
				What needs to be in place for test and evaluation?
				To what extent can we test real systems?
		4. Combatting Insider Threats
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of the practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide this topic?
				What are the major research gaps?
				What are some exemplary problems for R&D on this topic?
					Collect and Analyze
					Detect
					Deter
					Protect
					Predict
					React
				What are the near-term, midterm, long-term capabilities that need to be developed?
					Near Term
					Medium Term
					Long Term
				What R&D is evolutionary and what is more basic, higher risk, game changing?
				Resources
				Measures of success
				To what extent can we test real systems?
		5. Combatting Malware and Botnets
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of the practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide this topic?
				What are the major research gaps?
				What are some exemplary problems for R&D on this topic?
				What R&D is evolutionary, and what is more basic, higher risk, game changing?
				Measures of success
				What needs to be in place for test and evaluation?
				To what extent can we test real systems?
		6. Global-Scale Identity Management
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of the practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide the topic?
				What are the major research gaps?
				Resources
				Measures of success
				What needs to be in place for test and evaluation?
				To what extent can we test real systems?
		7. Survivability of Time-Critical Systems
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide the topics?
				What are the major research gaps?
					Detect
					React
				What are the challenges that must be addressed?
				What R&D is evolutionary and what is more basic, higher risk, game changing?
					Near term
					Medium term
					Long term
				Resources
				Measures of success
				What needs to be in place for test and evaluation?
				To what extent can we test real systems?
		8. Situational Understanding and Attack Attribution
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of the practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide this topic?
				What are the major gaps?
				What are some exemplary problems for R&D on this topic?
				What R&D is evolutionary and what is more basic, higher risk, game changing?
				Resources
				Measures of success
				What needs to be in place for test and evaluation?
				To what extent can we test real systems?
		9. Provenance
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide the topic?
				What are the major research gaps?
				What are some exemplary problem domains for R&D in this area?
				What R&D is evolutionary, and what is more basic, higher risk, game changing?
				Resources
				Measures of success
				What needs to be in place for test and evaluation?
		10. Privacy-Aware Security
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide the topic?
				What are the major research gaps?
					Selective disclosure and privacy-aware access
					Specification frameworks
					Policy issues
				What are some exemplary problems for R&D on this topic?
				What R&D is evolutionary and what is more basic, higher risk, game changing?
					Near term
					Medium term
					Long term
					Game changing
				Resources
				Measures of success
				What needs to be in place for test and evaluation?
		11. Usable Security
			Background
				What is the problem being addressed?
				What are the potential threats?
				Who are the potential beneficiaries? What are their respective needs?
				What is the current state of practice?
				What is the status of current research?
			Future Directions
				On what categories can we subdivide the topic?
				What are the major research gaps?
					Hard problems
					Other areas we might draw on
				What are some exemplary problems for R&D on this topic?
				What R&D is evolutionary and what is more basic, higher risk, game changing?
					Near term
					Medium term
				Resources
				Measures of success
				What needs to be in place for test and evaluation?
				To what extent can we test real systems?
	Appendix A. Interdependencies among Topics
		Topic 1. Scalable Trustworthy Systems
		Topic 2. Enterprise-Level Metrics (ELMs)
		Topic 3. System Evaluation Life Cycle
		Topic 4. Combatting Insider Threats
		Topic 5. Combatting Malware and Botnets
		Topic 6. Global-Scale Identity Management
		Topic 7. Survivability of Time Critical Systems
		Topic 8. Situational Understanding and Attack Attribution
		Topic 9. Provenance
		Topic 10. Privacy-Aware Security
		Topic 11. Usable Security
	Appendix B. Technology Transfer
		B.1. Introduction
			B.2. Fundamental Issues for Technology Transition
				What are likely effective ways to transfer the technology?
			B.3. Topic-Specific Considerations
				Topic 1: Scalable Trustworthy Systems
				Topic 2: Enterprise-Level Metrics (ELMs)
			B.4 Forcing Functions (Some Illustrative Examples)
				Government
				Academia
				Industry
	Appendix C. List of Participants  in the Roadmap Development
	Appendix D. Acronyms
	References
Chapter Sources
Index




نظرات کاربران