pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: MOVING TARGET DEFENSE II
APPLICATION OF GAME THEORY AND ADVERSARIAL MODELING
By: Sushil Jajodia (Editor), Anup K. Ghosh (Editor), V. S. Subrahmanian (Editor)
Format: Paperback

List price: £96.50


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1489993169
ISBN 13: 9781489993168
Publisher: SPRINGER-VERLAG NEW YORK INC.
Pub. date: 15 October, 2014
Edition: 2013 ed.
Series: Advances in Information Security 100
Pages: 204
Synopsis: Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.
Illustrations: 20 Tables, black and white; XII, 204 p.
Publication: US
Imprint: Springer-Verlag New York Inc.
Returns: Returnable
Some other items by this author:
A GENERAL FRAMEWORK FOR REASONING ON INCONSISTENCY (PB)
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (HB)
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (PB)
ADVANCES IN MULTIMEDIA INFORMATION SYSTEMS (PB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (HB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (PB)
COMPUTATIONAL ANALYSIS OF TERRORIST GROUPS: LASHKAR-E-TAIBA (HB)
COMPUTATIONAL ANALYSIS OF TERRORIST GROUPS: LASHKAR-E-TAIBA (PB)
COMPUTER SECURITY - ESORICS 2008 (PB)
COMPUTER SECURITY -- ESORICS 2013 (PB)
CONCEPTUAL MODELING (PB)
CYBER DECEPTION (HB)
CYBER DECEPTION : BUILDING THE SCIENTIFI (PB)
CYBER SITUATIONAL AWARENESS (HB)
CYBER SITUATIONAL AWARENESS (PB)
CYBER WARFARE (HB)
CYBER WARFARE (PB)
DATA AND APPLICATIONS SECURITY AND PRIVACY (PB)
DATA AND APPLICATIONS SECURITY XIX (PB)
DATABASE SECURITY XII (HB)
DATABASE SECURITY XII (PB)
E-COMMERCE SECURITY AND PRIVACY (HB)
E-COMMERCE SECURITY AND PRIVACY (PB)
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY (HB)
FOOD PACKAGING (HB)
GEOSPATIAL ABDUCTION (HB)
GEOSPATIAL ABDUCTION (PB)
GRAPHICAL MODELS FOR SECURITY (PB)
HANDBOOK OF COMPUTATIONAL APPROACHES TO COUNTERTERRORISM (HB)
HANDBOOK OF COMPUTATIONAL APPROACHES TO COUNTERTERRORISM (PB)
HANDBOOK OF DATABASE SECURITY (HB)
HANDBOOK OF DATABASE SECURITY (PB)
HETEROGENEOUS AGENT SYSTEMS (HB)
HETEROGENEOUS AGENT SYSTEMS (PB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (HB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (PB)
INDIAN MUJAHIDEEN (HB)
INDIAN MUJAHIDEEN (PB)
INFORMATION HIDING (HB)
INFORMATION HIDING (PB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (HB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (PB)
INFORMATION SECURITY THEORY AND PRACTICE (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (PB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (HB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (PB)
JOURNAL ON DATA SEMANTICS II (PB)
MACHINE LEARNING BASED MODEL OF BOKO HARAM
MACHINE LEARNING BASED MODEL OF BOKO HARAM (HB)
MOVING TARGET DEFENSE (HB)
MOVING TARGET DEFENSE (PB)
MOVING TARGET DEFENSE II (HB)
MULTILEVEL SECURE TRANSACTION PROCESSING (HB)
MULTILEVEL SECURE TRANSACTION PROCESSING (PB)
MULTIMEDIA DATABASE SYSTEMS (HB)
MULTIMEDIA DATABASE SYSTEMS (PB)
MULTIMEDIA INFORMATION SYSTEMS (HB)
MULTIMEDIA INFORMATION SYSTEMS (PB)
NETWORK HARDENING (PB)
NETWORK SECURITY METRICS
NETWORK SECURITY METRICS (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (PB)
PRINCIPLES OF MULTIMEDIA DATABASE SYSTEMS (HB)
PRIVACY IN LOCATION-BASED APPLICATIONS (PB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (HB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (PB)
PROCESSABILITY OF POLYMERIC COMPOSITES (HB)
SCALABLE UNCERTAINTY MANAGEMENT (PB)
SCALABLE UNCERTAINTY MANAGEMENT (PB)
SECURE CLOUD COMPUTING (HB)
SECURE CLOUD COMPUTING (PB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (HB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (HB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (PB)
TEMPORAL DATABASES (PB)
THE GLOBAL CYBER-VULNERABILITY REPORT (HB)
THEORY AND MODELS FOR CYBER SITUATION AWARENESS (PB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (HB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (PB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (HB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (PB)

TOP SELLERS IN THIS CATEGORY
The Art of Intrusion (Paperback)
John Wiley and Sons Ltd
Our Price : £10.22
more details
Practical Packet Analysis, 3e (Paperback)
No Starch Press,US
Our Price : £35.03
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket