Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cyberspace Mimic Defense, Jiangxing Wu


Варианты приобретения
Цена: 27950.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Jiangxing Wu   (Ву Джансин)
Название:  Cyberspace Mimic Defense
Перевод названия: Ву Джансин: Киберпространство мимической защиты
ISBN: 9783030298432
Издательство: Springer
Классификация:


ISBN-10: 3030298434
Обложка/Формат: Hardcover
Страницы: 735
Вес: 1.34 кг.
Дата издания: 19.12.2019
Серия: Wireless networks
Язык: English
Издание: 1st ed. 2020
Иллюстрации: 241 illustrations, color; 65 illustrations, black and white; xliv, 870 p. 306 illus., 241 illus. in color.
Размер: 234 x 156 x 41
Читательская аудитория: Professional & vocational
Подзаголовок: Generalized robust control and endogenous security
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change the easy-to-attack and difficult-to-defend game in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic mimic defense fog, and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats.

Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured.

Due to the loose coupling relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources.

It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandoras box in cyberspace.

Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.




China Internet Development Report 2017

Автор: Chinese Academy of Cyberspace Studies
Название: China Internet Development Report 2017
ISBN: 3662575205 ISBN-13(EAN): 9783662575208
Издательство: Springer
Рейтинг:
Цена: 15372.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides a comprehensive review of China`s Internet development in the past 23 years since the country`s first access to the Internet, especially since the 18th National Congress of the Communist Party of China.

World Internet Development Report 2017

Автор: Chinese Academy of Cyberspace Studies
Название: World Internet Development Report 2017
ISBN: 366257523X ISBN-13(EAN): 9783662575239
Издательство: Springer
Рейтинг:
Цена: 15372.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: An important outcome of the Fourth World Internet Conference, this book provides a comprehensive account of the status quo and trends in global Internet development. Covering network infrastructure, information technology, digital economy, e-governance, cyber security, and international cyberspace governance, it presents the Global Internet Development Index System to assess the Internet development of various major countries and emerging economies.

China Internet Development Report 2017

Автор: Chinese Academy of Cyberspace Studies
Название: China Internet Development Report 2017
ISBN: 3662585995 ISBN-13(EAN): 9783662585993
Издательство: Springer
Рейтинг:
Цена: 15372.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides a comprehensive review of China’s Internet development in the past 23 years since the country’s first access to the Internet, especially since the 18th National Congress of the Communist Party of China. It offers a systematic account of China’s experience in Internet development and governance, and establishes and presents China’s Internet Development Index System, covering network infrastructure, information technology, digital economy, e-governance, cyber security, and international cyberspace governance.

World Internet Development Report 2017

Автор: Chinese Academy of Cyberspace Studies
Название: World Internet Development Report 2017
ISBN: 3662586002 ISBN-13(EAN): 9783662586006
Издательство: Springer
Рейтинг:
Цена: 15372.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: An important outcome of the Fourth World Internet Conference, this book provides a comprehensive account of the status quo and trends in global Internet development. Covering network infrastructure, information technology, digital economy, e-governance, cyber security, and international cyberspace governance, it presents the Global Internet Development Index System to assess the Internet development of various major countries and emerging economies.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия