Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face.The papers in this issue are:• "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years.• "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations.• "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne ́c ̆ka, Peter Hanác ̆ek and Matej Kac ̆ic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software.• "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection.• "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.
Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems
RRP:
$62.00
Description
Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face.The papers in this issue are:• "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last 60 years.• "Fast Network Attack Modeling and Security Evaluation based on Attack Graphs" by Igor Kotenko and Andrey Chechulin describes an Attack Modeling and Security Evaluation Component that can construct attack graphs that can be used for network modeling and security evaluations.• "Code Search API, base of Parallel Code Refactoring System For Safety Standards Compliance" by Peter Jurne ́c ̆ka, Peter Hanác ̆ek and Matej Kac ̆ic considers a scheme for using verified code patterns in the construction of new software. It discusses the use of this API in aviation and medical software.• "Memory Acquisition by Using a Network Card" by Stefan Balogh of Slovakia outlines a new approach to rootkit detection.• "Making Static Code Analysis More Efficient" by Oksana V. Pomorova and Dmytro O. Ivanchyshyn describes how to use libraries of software vulnerabilities to make static analysis of programs more efficient.
We are now in the era of the Big Data revolution where nearly every aspect of computing engineering is driven by increasingly large, complex, and diverse datasets. Big Data presents not only a world...
The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multimedia services beyond traditional voice...
Aim:Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the...
Aim:Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the...
The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependence on IoT services mean that we must ensure that the IoT systems we design, develop, and deploy are...
Discover your next great read at BookLoop, Australiand online bookstore offering a vast selection of titles across various genres and interests. Whether you're curious about what's trending or searching for graphic novels that captivate, thrilling crime and mystery fiction, or exhilarating action and adventure stories, our curated collections have something for every reader. Delve into imaginative fantasy worlds or explore the realms of science fiction that challenge the boundaries of reality. Fans of contemporary narratives will find compelling stories in our contemporary fiction section. Embark on epic journeys with our fantasy and science fiction titles,
Shop Trending Books and New Releases
Explore our new releases for the most recent additions in romance books, fantasy books, graphic novels, crime and mystery books, science fiction books as well as biographies, cookbooks, self help books, tarot cards, fortunetelling and much more. With titles covering current trends, booktok and bookstagram recommendations, and emerging authors, BookLoop remains your go-to local australian bookstore for buying books online across all book genres.
Shop Best Books By Collection
Stay updated with the literary world by browsing our trending books, featuring the latest bestsellers and critically acclaimed works. Explore titles from popular brands like Minecraft, Pokemon, Star Wars, Bluey, Lonely Planet, ABIA award winners, Peppa Pig, and our specialised collection of ADHD books. At BookLoop, we are committed to providing a diverse and enriching reading experience for all.
Sign In
your cart
Your cart is empty
Menu
Search
PRE-SALES
If you have any questions before making a purchase chat with our online operators to get more information.