Theory of Modeling and Simulation: Discrete Event & Iterative System Computational Foundations, Third Edition, continues the legacy of this authoritative and complete theoretical work. It is ideal for graduate and PhD students and working engineers interested in posing and solving problems using the tools of logico-mathematical modeling and computer simulation. Continuing its emphasis on the in…
Terdapat bibliografi dan indeks. Table of contents: 1. Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 2. Static Disassembly and Code Analysis 3. A Next-Generation Platform for Analyzing Executables 4. Behavioral and Structural Properties of Malicious Code 5. Detection and Prevention of SQL Injection Attacks 6. Very Fast Containment of Scanning Worms, Revisited 7.…
Terdapat bibliografi dan indeks. Table of contents: 1. Introduction 2. Computer security and intrusion detection 3. Alert correlation 4. Alert collection 5. Alert aggregation and verification 6. High-level alert structures 7. Large-scale correlation 8. Evaluation 9. Open issues 10. Conclusions.
Contents: 1. Why radio profiling 2. Basic radio theory and introduction to radio systems 3. Targets 4. Offsite profiling 5. Onsite radio profiling 6. How to use the information you gather 7. Basic overview of equipment and how it works 8. The house dosn't always win: a wireless reconnaissance case study 9. New technology
Terdapat indeks. Table of Contents: Part I Computer Forensics and Evidence Dynamics 1. Computer Forensics Essentials 2. Rules of Evidence, Case Law, and Regulation 3. Evidence Dynamics Part II Information Systems 4. Interview, Policy, and Audit 5. Network Topology and Architecture 6. Volatile Data Part III Data Storage Systems and Media 7. Physical Disk Technologies 8. SAN, …
Contents: Chapter 1: Overview of Cryptography 1.1. Introduction 1.2. Information Security and Cryptography 1.3. Background of Functions 1.4. Basic Terminology and Concepts 1.5. Symmteric-Key Encryption 1.6. Digital Signature 1.7. Authentication and Identification 1.8. Public-Key Cryptography 1.9. Hash Function 1.10. Protocols and Mechanisms 1.11. Key Establishment, Manage…
Contents: Part 1. The Basics of Cummunications 1. Basics of Communications Technology 2. Media and their Applications 3. Architecture, Models, and Standards Part 2. Network Basics 4. Building a Network: Topology and Protocols 5. Network Form and Function Part 3. Wide Area Networks: The Internet 6. From LANs to WANs: Broadband Technology 7. The Internet, Intranets, and Extranets …