000 | 03668nam a2200589 i 4500 | ||
---|---|---|---|
001 | 8327691 | ||
003 | IEEE | ||
005 | 20220712204919.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 180605s2018 mau ob 001 eng d | ||
020 |
_a9780262346641 _qelectronic bk. |
||
020 |
_z0262346648 _qelectronic bk. |
||
020 | _z9780262535373 | ||
020 | _z0262535378 | ||
035 | _a(CaBNVSL)mat08327691 | ||
035 | _a(IDAMS)0b00006487b95bf8 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aTK5105.59 _b.N3464 2018eb |
|
082 | 0 | 4 |
_a658.4/78 _223 |
245 | 0 | 0 |
_aNew solutions for cybersecurity / _cedited by Howard Shrobe, David L. Shrier, and Alex Pentland. |
264 | 1 |
_aCambridge, Massachusetts : _bMIT Press, _c[2018] |
|
264 | 2 |
_a[Piscataqay, New Jersey] : _bIEEE Xplore, _c[2018] |
|
300 | _a1 PDF (504 pages). | ||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 | _aMIT connections science & engineering | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIntro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risks�a#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholders�a#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA) | |
505 | 8 | _aCHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISP�a#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy | |
505 | 8 | _aCHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies | |
506 | _aRestricted to subscribers or individual electronic text purchasers. | ||
520 | _aExperts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives. | ||
530 | _aAlso available in print. | ||
538 | _aMode of access: World Wide Web | ||
588 | 0 | _aPrint version record. | |
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aInternet _xSecurity measures. _97338 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _93969 |
|
650 | 7 |
_aInternet _xSecurity measures. _2fast _97338 |
|
655 | 4 |
_aElectronic books. _93294 |
|
700 | 1 |
_aShrobe, Howard E., _eeditor. _925322 |
|
700 | 1 |
_aShrier, David L., _eeditor. _925323 |
|
700 | 1 |
_aPentland, Alex, _d1952- _eeditor. _925324 |
|
710 | 2 |
_aIEEE Xplore (Online Service), _edistributor. _925325 |
|
710 | 2 |
_aMIT Press, _epublisher. _925326 |
|
776 | 0 | 8 |
_iPrint version: _tNew solutions for cybersecurity. _dCambridge, MA : MIT Press, [2018] _z9780262535373 _w(DLC) 2017040417 _w(OCoLC)1003255394 |
830 | 0 |
_aMIT connections science & engineering _925327 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8327691 |
942 | _cEBK | ||
999 |
_c73540 _d73540 |