DISRUPTIVE SECURITY TECHNOLOGIES WITH MOBILE CODE AND PEER-TO-PEER NETWORKS

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming t...

Full description

Saved in:
Bibliographic Details
Main Author: Brooks, R. R Richard R. (Author)
Format: Book
Language:English
Published: Boca Raton CRC Press 2005
© 2005
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-331076
005 2020815162110
008 200915 2005 -US a|| #001 |#eng#D
020 # # |a 0849322723  |q hardback 
020 # # |a 9780849322723  |q hardback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.525  |b .B76 2005 
100 1 # |a Brooks, R. R  |e author  |q Richard R. 
245 1 1 |a DISRUPTIVE SECURITY TECHNOLOGIES WITH MOBILE CODE AND PEER-TO-PEER NETWORKS  |c R.R. Brooks 
264 # 1 |a Boca Raton  |b CRC Press  |c 2005 
264 # 1 |c © 2005 
300 # # |a 381 pages  |b illustrations  |c 25 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliographical references (p. [355]-372) and index 
520 # # |a The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms. Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security. Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats. 
650 # 0 |a Disruptive technologies 
650 # 0 |a Computer networks  |x Security measures 
650 # 0 |a Peer-to-peer architecture (Computer networks) 
650 # 0 |a Computer viruses 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=331076 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||