72,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
36 °P sammeln
  • Format: PDF

Reviews a range of network security models that focus on combining individual metric scores obtained from standard scoring systems, such as CVSS, into an overall measure of network security.
Devotes several chapters on network security metrics specifically designed with zero day attacks in mind
Discusses various applications of network security metrics, ranging from network attack graph analytics to performance evaluation for security operation centers.

Produktbeschreibung
Reviews a range of network security models that focus on combining individual metric scores obtained from standard scoring systems, such as CVSS, into an overall measure of network security.

Devotes several chapters on network security metrics specifically designed with zero day attacks in mind

Discusses various applications of network security metrics, ranging from network attack graph analytics to performance evaluation for security operation centers.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
The authors of this book conducted several research initiatives in the area of computer security, privacy and cyber forensics. The content reported is the result of a 4-year research project on the aspect oriented security hardening of UML design models and is based on a fruitful collaboration between Concordia University and Ericsson under a research partnership program of the Canadian Natural Sciences and Engineering Research Council (NSERC).