Besplatna dostava Overseas kurirskom službom iznad 59.99 €
Overseas 4.99 Pošta 4.99 DPD 5.99 GLS 3.99 GLS paketomat 3.49 Box Now 4.49

Besplatna dostava putem Box Now paketomata i Overseas kurirske službe iznad 59,99 €!

Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems

Jezik EngleskiEngleski
Knjiga Meki uvez
Knjiga Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems Igor Kotenko
Libristo kod: 09010158
Nakladnici River Publishers, siječanj 2014
Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue t... Cijeli opis
? points 125 b
49.93
Vanjske zalihe Šaljemo za 15-20 dana

30 dana za povrat kupljenih proizvoda


Moglo bi vas zanimati i


TOP
Legend Trilogy Boxed Set Marie Lu / Tvrdi uvez
common.buy 46.30
Selected Writings Anna Freud / Meki uvez
common.buy 17.34
Alien Among Anxious Artists Dennis Parks / Tvrdi uvez
common.buy 34.80
Cookie Doughlicious Lara Ferroni / Tvrdi uvez
common.buy 17.04
AOP CLASSICAL COLLECTION CL 1 J & WILLIA O'REILLY / Meki uvez
common.buy 6.95
Kinder-Verwirr-Buch Joachim Ringelnatz / Meki uvez
common.buy 21.58
Minecraft - leicht gemacht! Andreas Zintzsch / Meki uvez
common.buy 9.88
Reminiscences of A Veteran Major Thomas Bunbury 80th Regt. / Meki uvez
common.buy 21.68

Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face. The papers in this issue are: . "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years. . "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations. . "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne żc żka, Peter Hanác żek and Matej Kac żic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software. . "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection. . "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.

Informacije o knjizi

Puni naziv Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems
Jezik Engleski
Uvez Knjiga - Meki uvez
Datum izdanja 2014
Broj stranica 96
EAN 9788793102965
ISBN 9788793102965
Libristo kod 09010158
Nakladnici River Publishers
Težina 145
Dimenzije 156 x 234 x 6
Poklonite ovu knjigu još danas
To je jednostavno
1 Dodajte knjigu u košaricu i odaberite isporuku kao poklon 2 Zauzvrat ćemo vam poslati kupon 3 Knjiga dolazi na adresu poklonoprimca

Prijava

Prijavite se na svoj račun. Još nemate Libristo račun? Otvorite ga odmah!

 
obvezno
obvezno

Nemate račun? Ostvarite pogodnosti uz Libristo račun!

Sve ćete imati pod kontrolom uz Libristo račun.

Otvoriti Libristo račun