Apress Access

Cyberspace Security and Defense: Research Issues

Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004.

By Janusz S. Kowalik , Janusz Gorski , Anatoly Sachenko

  • eBook Price: $119.00
Buy eBook Buy Print Book

Cyberspace Security and Defense: Research Issues Cover Image

  • Add to Wishlist
  • ISBN13: 978-1-4020-3379-7
  • 396 Pages
  • User Level: Science
  • Publication Date: March 30, 2006
  • Available eBook Formats: PDF
Full Description
Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security. Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not 'Should we do something for enhancing our digital assets security', the question is 'How to do it'.
Table of Contents

Table of Contents

  1. Preface.
  2. Part 1: General Security Issues.
  3. Part 2: Dependability Safety Analysis Methods.
  4. Part 3: Networks Design of Distributed Sensor Networks for Security and Defense.
  5. Part 4: Early Warning Information Systems and Secure Access Control Honeynets: Foundations for the Development of Early Warning Information Systems.
  6. Part 5: Cryptography Improved Block Cipher Counter Mode of Operations Schemes.
  7. Part 6: Intrusion Detection An Infrastructure for Distributed Event Acquisition.

If you think that you've found an error in this book, please let us know by emailing to editorial@apress.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed.
No errata are currently published


    1. PHP Objects, Patterns, and Practice


      View Book

    2. Beginning Android 3D Game Development


      View Book

    3. Troubleshooting Oracle Performance


      View Book

    4. Beginning Amazon Web Services with Node.js


      View Book