DISRUPTIVE SECURITY TECHNOLOGIES WITH MOBILE CODE AND PEER-TO-PEER NETWORKS
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming t...
Saved in:
Main Author: | Brooks, R. R Richard R. (Author) |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton
CRC Press
2005
© 2005 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Peer-to-peer computing the evolution of a disruptive technology
Published: (2005) -
Peer-to-peer computing building supercomputers with Web technologies
by: Loo, Alfred Wai-Sing
Published: (2007) -
Peer-to-Peer building secure, scalable, and manageable networks
by: Moore, Dana
Published: (2002) -
Peer-to-peer video the economics, policy, and culture of today's new mass medium
Published: (2008) -
Peer-to-peer systems First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002 : revised papers
Published: (2002)