New solutions for cybersecurity / (Record no. 73540)

000 -LEADER
fixed length control field 03668nam a2200589 i 4500
001 - CONTROL NUMBER
control field 8327691
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220712204919.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180605s2018 mau ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780262346641
-- electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic bk.
082 04 - CLASSIFICATION NUMBER
Call Number 658.4/78
245 00 - TITLE STATEMENT
Title New solutions for cybersecurity /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (504 pages).
490 1# - SERIES STATEMENT
Series statement MIT connections science & engineering
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Intro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risks�a#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholders�a#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
505 8# - FORMATTED CONTENTS NOTE
Remark 2 CHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISP�a#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
505 8# - FORMATTED CONTENTS NOTE
Remark 2 CHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies
520 ## - SUMMARY, ETC.
Summary, etc Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Shrobe, Howard E.,
700 1# - AUTHOR 2
Author 2 Shrier, David L.,
700 1# - AUTHOR 2
Author 2 Pentland, Alex,
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8327691
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cambridge, Massachusetts :
-- MIT Press,
-- [2018]
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2018]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 0# -
-- Print version record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Internet
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Internet

No items available.