200,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Gebundenes Buch

This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that can be used to create systems that overcome security attacks through adaptation as opposed to the earlier fortress mentality, and provides instruction on creating disruptive applications that are much more secure than in the past. The book provides a fundamental understanding of design principles, and provides a model explaining mobile code and the methods that can be used to design secure robust peer-to-peer networks. Also included are recent…mehr

Produktbeschreibung
This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that can be used to create systems that overcome security attacks through adaptation as opposed to the earlier fortress mentality, and provides instruction on creating disruptive applications that are much more secure than in the past. The book provides a fundamental understanding of design principles, and provides a model explaining mobile code and the methods that can be used to design secure robust peer-to-peer networks. Also included are recent research results on the information assurance aspects of mobile code.
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. Disruptive security technologies are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms. This book builds a foundation for developing these adaptive systems, describing the design principles and the fundamentals of this new security paradigm. The author covers topics such as the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.
Autorenporträt
R.R. Brooks