Cyberspace Security and Defense: Research Issues

Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004.

By Janusz S. Kowalik , Janusz Gorski , Anatoly Sachenko

Cyberspace Security and Defense: Research Issues Cover Image

  • ISBN13: 978-1-4020-3379-7
  • 396 Pages
  • User Level: Science
  • Publication Date: March 30, 2006
  • Available eBook Formats: PDF
  • eBook Price: $109.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security. Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not 'Should we do something for enhancing our digital assets security', the question is 'How to do it'.
Table of Contents

Table of Contents

  1. Preface.
  2. Part 1: General Security Issues.
  3. Part 2: Dependability Safety Analysis Methods.
  4. Part 3: Networks Design of Distributed Sensor Networks for Security and Defense.
  5. Part 4: Early Warning Information Systems and Secure Access Control Honeynets: Foundations for the Development of Early Warning Information Systems.
  6. Part 5: Cryptography Improved Block Cipher Counter Mode of Operations Schemes.
  7. Part 6: Intrusion Detection An Infrastructure for Distributed Event Acquisition.
Errata

Please Login to submit errata.

No errata are currently published