New solutions for cybersecurity / (Record no. 73540)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03668nam a2200589 i 4500 |
001 - CONTROL NUMBER | |
control field | 8327691 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220712204919.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180605s2018 mau ob 001 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780262346641 |
-- | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic bk. |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 658.4/78 |
245 00 - TITLE STATEMENT | |
Title | New solutions for cybersecurity / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 PDF (504 pages). |
490 1# - SERIES STATEMENT | |
Series statement | MIT connections science & engineering |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Intro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risks�a#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholders�a#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA) |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | CHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISP�a#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | CHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies |
520 ## - SUMMARY, ETC. | |
Summary, etc | Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Shrobe, Howard E., |
700 1# - AUTHOR 2 | |
Author 2 | Shrier, David L., |
700 1# - AUTHOR 2 | |
Author 2 | Pentland, Alex, |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8327691 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cambridge, Massachusetts : |
-- | MIT Press, |
-- | [2018] |
264 #2 - | |
-- | [Piscataqay, New Jersey] : |
-- | IEEE Xplore, |
-- | [2018] |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | electronic |
-- | isbdmedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
588 0# - | |
-- | Print version record. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Internet |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Internet |
No items available.