IMIST


Votre recherche a retourné 16 résultats.

Security and game theory algorithms, deployed systems, lessons learned par Tambe, Milind Publication : Cambridge | New York Cambridge University Press 2012 . xiv, 319 pages , "Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"-- 24 cm. Date : 2012 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Understanding intrusion detection through visualization / par Axelsson, Stefan. Publication : [S.l.] : Springer, 2005 . 145 p. ; , With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents researchïɪħon why false alarms are, and will remain a problem; then appliesïɪħresults from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. Thisïɪħvolume presents four different visualization approaches, mainly applied to data from web server access logs. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Designing security architecture solutions / par Ramachandran, Jay. Publication : New York : John Wiley, 2002 . 1 online resource (xxviii, 452 pages) : , "Wiley Computer Publishing." Date : 2002 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Developer's guide to web application security / par Cross, Michael, Publication : . 1 online resource (xxii, 489 pages) : , Includes index. Disponibilité :  http://www.sciencedirect.com/science/book/9781597490610,

Botnets : the killer web app / par Schiller, Craig A. Publication : . 1 online resource (xv, 464 pages) : , Includes index. Disponibilité :  http://www.sciencedirect.com/science/book/9781597491358,

Open source fuzzing tools. par Rathaus, Noam. Publication : . 1 online resource. Disponibilité :  http://www.sciencedirect.com/science/book/9781597491952,

FISMA certification and accreditation handbook / par Taylor, Laura. Publication : . 1 online resource (xxx, 498 pages) : , Includes index. Disponibilité :  http://www.sciencedirect.com/science/book/9781597491167,

Metasploit toolkit for penetration testing, exploit development, and vulnerability research / par Maynor, David. Publication : . 1 online resource (xvi, 272 pages) : Disponibilité :  http://www.sciencedirect.com/science/book/9781597490740,

Vous ne trouvez pas ce que vous cherchez ?
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha