Disruptive security technologies with mobile code and peer-to-peer networks. (©2005)
- Record Type:
- Book
- Title:
- Disruptive security technologies with mobile code and peer-to-peer networks. (©2005)
- Main Title:
- Disruptive security technologies with mobile code and peer-to-peer networks
- Further Information:
- Note: R.R. Brooks.
- Other Names:
- Brooks, R. R (Richard R.)
- Contents:
- OVERVIEW; NETWORK SECURITY PROBLEMS; Vulnerabilities; Attacks; Threat Modeling; Physical Security; Social Engineering; Privacy; Fraud; Scavenging; Trojan Horses; Trapdoors; Viruses; Worms; Reverse Engineering; Covert Communications Channels and Inferencing; Buffer Overflow and Stack Smashing; Denial of Service (DoS); Distributed Denial of Service (DDoS); Man in the Middle Attacks; Replay Attacks; Cryptanalysis; DNS and BGP Vulnerabilities; Exercises; CURRENT SECURITY SOLUTIONS; Audits; Encryption; Steganography; Obfuscation; Public Key Infrastructure (PKI); Code Signing; SSH, SSL, and TLS; Formal Methods; Virus Scanners; Attack Graphs; Security Automata; Sandboxing; Firewalls; Red-Black Separation; Proof Carrying Code; Secure Hardware; Dependability, Safety, Liveness; Quality of Service; Artificial Immune Systems; Exercises; DISRUPTIVE TECHNOLOGIES; Mobile Code; Peer-To-Peer Networks; Field Programmable Gate Arrays (FPGA's); Adaptation; Conclusion; Exercises; UNDERSTANDING NETWORKS; Internet Protocol Background; Networks of Embedded Control Systems; Network Topology; Scale-Free Graphs; Traffic Flows; Conclusion; Exercises; UNDERSTANDING MOBILE CODE; Existing Paradigms; Existing Implementations; Theoretical Model; Simulator for Model; Models of Paradigms; Simulation Studies of Models; Models of Networking Pathologies; Simulation Studies of Pathologies; Comparison of Cantor with Other Network Simulations; Taxonomies of Mobile Code and Security; Mobile Code DaemonOVERVIEW; NETWORK SECURITY PROBLEMS; Vulnerabilities; Attacks; Threat Modeling; Physical Security; Social Engineering; Privacy; Fraud; Scavenging; Trojan Horses; Trapdoors; Viruses; Worms; Reverse Engineering; Covert Communications Channels and Inferencing; Buffer Overflow and Stack Smashing; Denial of Service (DoS); Distributed Denial of Service (DDoS); Man in the Middle Attacks; Replay Attacks; Cryptanalysis; DNS and BGP Vulnerabilities; Exercises; CURRENT SECURITY SOLUTIONS; Audits; Encryption; Steganography; Obfuscation; Public Key Infrastructure (PKI); Code Signing; SSH, SSL, and TLS; Formal Methods; Virus Scanners; Attack Graphs; Security Automata; Sandboxing; Firewalls; Red-Black Separation; Proof Carrying Code; Secure Hardware; Dependability, Safety, Liveness; Quality of Service; Artificial Immune Systems; Exercises; DISRUPTIVE TECHNOLOGIES; Mobile Code; Peer-To-Peer Networks; Field Programmable Gate Arrays (FPGA's); Adaptation; Conclusion; Exercises; UNDERSTANDING NETWORKS; Internet Protocol Background; Networks of Embedded Control Systems; Network Topology; Scale-Free Graphs; Traffic Flows; Conclusion; Exercises; UNDERSTANDING MOBILE CODE; Existing Paradigms; Existing Implementations; Theoretical Model; Simulator for Model; Models of Paradigms; Simulation Studies of Models; Models of Networking Pathologies; Simulation Studies of Pathologies; Comparison of Cantor with Other Network Simulations; Taxonomies of Mobile Code and Security; Mobile Code Daemon Implementation; Conclusion; Exercises; PROTECTING MOBILE CODE; Control Flow Modification; Bytecode Modification; Protocol for Exchanging Bytecode Tables; Entropy Maximization of Bytecode Mappings; Bytecode Steganography; Use of Secure Co-Processors; Conclusion; Exercises; PROTECTING MOBILE CODE PLATFORMS; Smart Card Applications; Building Control Systems; FPGA Cryptography Engine; Differential Power Analysis; Conclusion; Exercises; MAINTAINING TRUST ON THE NETWORK; Assumptions and Primitives; Mobile Code Verification; Host Verification; Multi-Level Security; Conclusion; Exercises; DESIGNING PEER-TO-PEER SYSTEMS; Graph Theory Background; Random Graph Background; Number of Hops Between Nodes; Dependability of Peer-To-Peer Systems; Vulnerability to Attack; Quality of Service of Peer-To-Peer Systems; Correct Number of Indexes; Key Management; Conclusion; Exercises; EMERGENT ROUTING AND RESOURCE DISCOVERY; Ad Hoc Data Routing Background; Spin-Glass Routing; Multi-Fractal Routing; Pheromone Routing; Comparison of Routing Algorithms; Epidemic Resource Discovery; Conclusion; Exercises; DENIAL OF SERVICE COUNTERMEASURES; Denial of Service (DoS) Background; Traffic Flow Measures; Attack Detection; Verification of Detector; Game Theory Analysis; Network Structure Vulnerabilities; Conclusion; Exercises; CONCLUSIONS; INDEX … (more)
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2005
- Copyright Date:
- 2005
- Extent:
- 1 online resource (381 pages), illustrations
- Subjects:
- 005.8
Peer-to-peer architecture (Computer networks)
Computer networks -- Security measures
Computer viruses
Disruptive technologies
P2P (Réseaux d'ordinateurs)
Réseaux d'ordinateurs -- Sécurité -- Mesures
Virus informatiques
COMPUTERS -- Internet -- Security
COMPUTERS -- Networking -- Security
COMPUTERS -- Security -- General
Computer networks -- Security measures
Computer viruses
Disruptive technologies
Peer-to-peer architecture (Computer networks)
Electronic books - Languages:
- English
- ISBNs:
- 1420038885
9781420038880
0849322723
9780849322723 - Notes:
- Note: Includes bibliographical references (pages 355-372) and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.167197
- Ingest File:
- 01_021.xml