Department of Defense Sponsored Information Security Research: New Methods for Protecting Agains Cyber Threats
- After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks
- Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years
- An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and industry network needs
- Discusses software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies
Table of Contents
Introduction (Steven King).
Chapter 1. Architecting Information Infrastructures for Security (Cliff Wang).
1.1 Architectures for Secure and Robust Distributed Infrastructures.
1.2 A complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure.
1.3 Anomaly and Misuse Detection in Network Traffic Streams-Checking and Machine Learning Approaches.
1.4 Distributed Systems Security via Logical Framework.
1.5 Distributed Immune Systems for Wireless Networks Information Assurance.
1.6 Hi-DRA High-Speed, Wide-Area Network Detection, Response, and Analysis.
Chapter 2. At the Edges of the Critical Information Infrastructure (David Hislop, Todd Combs).
2.1 Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security.
2.2 Software Model Checking for Embedded Systems.
2.3 Advanced tool Integration for Embedded System Assurance.
2.4 Verification Tools for Embedded Systems.
Chapter 3. Software Engineering for Assurance (Ralph Wachter, Gary Toth).
3.1 Static Analysis to Enhance toe Power of Model Checking for Concurrent Software.
3.2 Protecting COTS from the Inside.
3.3 RAPIDware: Component-Based Development of Adaptive and Dependable Middleware.
3.4 Generating Efficient Trust Management Software from Policies.
3.5 Modeling and Simulation Environment for Critical Information Protection.
Chapter 4. Malicious Mobile Code (Ralph Wachter, Gary Toth).
4.1 Language-Based Security for Malicious Mobile Code.
4.2 Model-Carrying Code: A New Approach to Mobile-Code Security.
4.3 Neutralizing Malicious Mobile Code.
Chapter 5. Dependable Critical Information Infrastructure for Command and Control (Robert Herklotz, Chris Arney).
5.1 Trustworthy Infrastructure, Mechanisms, and Experimentation for Diffuse Computing.
5.2 Adaptable Situation-Aware Secure Services-Based Systems.
5.3 Detecting Deception in the Military Infosphere: Improving and Integrating Human Detection Capabilities with Automated Tools.
5.4 Vulnerability Assessment Tools for Complex Information Networks.
Sign up now »
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTLead Software EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTSenior Python DeveloperNSW
- FTQuality ManagerSA
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FTTechnical Business AnalystNSW
- FTOS Web Applications DeveloperNSW
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- IN PICTURES: Citrix Solutions expo (49 photos)
- IN PICTURES: Citrix parties one more night with Maroon 5 ( +57 photos)
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia