Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities explo
1101525891
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities explo
69.99 In Stock
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

by R.R. Brooks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

by R.R. Brooks

eBook

$69.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities explo

Product Details

ISBN-13: 9781040189436
Publisher: CRC Press
Publication date: 11/29/2004
Sold by: Barnes & Noble
Format: eBook
Pages: 400
File size: 8 MB

Table of Contents

Overview. Network Security Problems. Current Security Solutions. Disruptive Technologies. Understanding Networks. Understanding Mobile Code. Protecting Mobile Code. Protecting Mobile Code Platforms. Maintaining Trust on the Network. Designing Peer-To-Peer Systems. Emergent Routing and Resource Discovery. Denial of Service Countermeasures. Conclusions. Index.
From the B&N Reads Blog

Customer Reviews