Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Hardcover)
  • All (17) from $1.99   
  • New (6) from $2.99   
  • Used (11) from $1.99   

Overview

  • After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks
  • Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years
  • An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and industry network needs
  • Discusses software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies
Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
When it comes to security, you need all the help you can get. This book puts the world's most powerful organization on your side: the U.S. Department of Defense.

Since 9/11, DOD has spent over $80 million to identify state-of-the-art techniques for defending networks against terrorists and other bad guys. DOD investigated a wide spectrum of new ideas from many of the field's leading researchers. Now, five years later, the project's leaders have identified the approaches that are proving most valuable. This book presents that work in language every IT professional, manager, and security specialist can understand -- and use.

It's organized into five key areas: architecting information infrastructures for security; protecting the edges of critical infrastructure; engineering software for security assurance; countering malicious mobile code; and ensuring the dependable command and control of IT infrastructure.

As an example, you'll find leading-edge work on automating the creation of role-based access control security policies. (If you've ever done it by hand, you know how welcome that'll be.) You'll also find advanced techniques for building safer large-scale services-based systems: systems that are "adaptable, situation-aware, and secure" -- and, as you move towards SOA, this, too, will be extremely valuable.

There are discussions of powerful new approaches to improving the effectiveness of network intrusion detection and host-based defenses. These include machine learning techniques capable of discovering new signatures based on known attacks, as well as more effective ways to detect zombie botnet attacks.

Some of the work discussed here is potentially usable now, or will be soon. Some of it hasn't been commercialized yet: Often, that's the next step. Put another way, reading this book takes you to the leading edge. Exactly where you need to be to stay ahead of the bad guys. Bill Camarda, from the August 2007 Read Only

Read More Show Less

Product Details

  • ISBN-13: 9780471787563
  • Publisher: Wiley, John & Sons, Incorporated
  • Publication date: 7/12/2007
  • Edition number: 1
  • Pages: 688
  • Product dimensions: 8.75 (w) x 11.10 (h) x 1.70 (d)

Meet the Author

In 2001, the Director of Defense research and Engineering in the Office of the Secretary of Defense initiated an $80 million, five-year research program at U.S. universities in critical infrastructure protection and high confidence adaptable software. Managed by the Department of Defense science offices, these projects produced the results summarized here.
Read More Show Less

Table of Contents

Foreword.

Acknowledgements.

Introduction (Steven King).

Chapter 1. Architecting Information Infrastructures for Security (Cliff Wang).

1.1 Architectures for Secure and Robust Distributed Infrastructures.

1.2 A complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure.

1.3 Anomaly and Misuse Detection in Network Traffic Streams-Checking and Machine Learning Approaches.

1.4 Distributed Systems Security via Logical Framework.

1.5 Distributed Immune Systems for Wireless Networks Information Assurance.

1.6 Hi-DRA High-Speed, Wide-Area Network Detection, Response, and Analysis.

Chapter 2. At the Edges of the Critical Information Infrastructure (David Hislop, Todd Combs).

2.1 Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security.

2.2 Software Model Checking for Embedded Systems.

2.3 Advanced tool Integration for Embedded System Assurance.

2.4 Verification Tools for Embedded Systems.

Chapter 3. Software Engineering for Assurance (Ralph Wachter, Gary Toth).

3.1 Static Analysis to Enhance toe Power of Model Checking for Concurrent Software.

3.2 Protecting COTS from the Inside.

3.3 RAPIDware: Component-Based Development of Adaptive and Dependable Middleware.

3.4 Generating Efficient Trust Management Software from Policies.

3.5 Modeling and Simulation Environment for Critical Information Protection.

Chapter 4. Malicious Mobile Code (Ralph Wachter, Gary Toth).

4.1 Language-Based Security for Malicious Mobile Code.

4.2 Model-Carrying Code: A New Approach to Mobile-Code Security.

4.3 Neutralizing Malicious Mobile Code.

Chapter 5. Dependable Critical Information Infrastructure for Command and Control (Robert Herklotz, Chris Arney).

5.1 Trustworthy Infrastructure, Mechanisms, and Experimentation for Diffuse Computing.

5.2 Adaptable Situation-Aware Secure Services-Based Systems.

5.3 Detecting Deception in the Military Infosphere: Improving and Integrating Human Detection Capabilities with Automated Tools.

5.4 Vulnerability Assessment Tools for Complex Information Networks.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Posted February 15, 2012

    more from this reviewer

    Highly Recommended - A good compilation book of Information Security Research

    A good compilation book of Information Security Research

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)