Secure computer and network systems : modeling, analysis and design / Nong Ye.

By: Ye, NongMaterial type: TextTextPublisher: Chichester, England ; Hoboken, NJ : J. Wiley & Sons, c2008Description: xvii, 336 p. : ill. ; 26 cmISBN: 9780470023242 (pbk.); 0470023244 (pbk.)Subject(s): Computer networks -- Security measures | Computer networks -- Design and construction | Computer securityDDC classification: 005.8 LOC classification: TK5105.59 | .Y44 2008Online resources: Table of contents only | Publisher description | Contributor biographical information
Contents:
Assets, vulnerabilities and threats of computer and network systems -- Protection of computer and network systems -- Asset protection-driven, policy-based security protection architecture -- Job admission control for service stability -- Job scheduling methods for service differentiation and service stability -- Job reservation and service protocols for end-to-end delay guarantee -- Collection of Windows performance objects data under attack and normal use conditions -- Mean shift characteristics of attack and normal use data -- Probability distribution change characteristics of attack and normal use data -- Autocorrelation change characteristics of attack and normal use data -- Wavelet change characteristics of attack and normal use data -- Clustering and classifying attack and normal use data -- Learning and recognizing attack signatures using artificial neural networks -- Statistical anomaly detection with univariate and multivariate data -- Stochastic anomaly detection using the Markov chain model of event transitions -- Mathematical and statistical models of attack data and normal use data -- Cuscore-based attack norm separation models -- Optimal selection and correlation of attack data characteristics in attack profiles.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Call number Copy number Status Notes Date due Barcode
Books Books Female Library
TK5105.59 .Y44 2008 (Browse shelf (Opens below)) 1 Available STACKS 51952000094128
Books Books Main Library
TK5105.59 .Y44 2008 (Browse shelf (Opens below)) 1 Available STACKS 51952000121190

Includes bibliographical references and index.

Assets, vulnerabilities and threats of computer and network systems -- Protection of computer and network systems -- Asset protection-driven, policy-based security protection architecture -- Job admission control for service stability -- Job scheduling methods for service differentiation and service stability -- Job reservation and service protocols for end-to-end delay guarantee -- Collection of Windows performance objects data under attack and normal use conditions -- Mean shift characteristics of attack and normal use data -- Probability distribution change characteristics of attack and normal use data -- Autocorrelation change characteristics of attack and normal use data -- Wavelet change characteristics of attack and normal use data -- Clustering and classifying attack and normal use data -- Learning and recognizing attack signatures using artificial neural networks -- Statistical anomaly detection with univariate and multivariate data -- Stochastic anomaly detection using the Markov chain model of event transitions -- Mathematical and statistical models of attack data and normal use data -- Cuscore-based attack norm separation models -- Optimal selection and correlation of attack data characteristics in attack profiles.

1 2

There are no comments on this title.

to post a comment.