New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentland.
Contributor(s): Shrobe, Howard E [editor.] | Shrier, David L [editor.] | Pentland, Alex [editor.] | IEEE Xplore (Online Service) [distributor.] | MIT Press [publisher.].
Material type: BookSeries: MIT connections science & engineering: Publisher: Cambridge, Massachusetts : MIT Press, [2018]Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [2018]Description: 1 PDF (504 pages).Content type: text Media type: electronic Carrier type: online resourceISBN: 9780262346641.Subject(s): Computer networks -- Security measures | Internet -- Security measures | Computer networks -- Security measures | Internet -- Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: New solutions for cybersecurity.DDC classification: 658.4/78 Online resources: Abstract with links to resource Also available in print.Includes bibliographical references and index.
Intro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risks�a#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholders�a#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
CHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISP�a#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
CHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies
Restricted to subscribers or individual electronic text purchasers.
Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
Also available in print.
Mode of access: World Wide Web
Print version record.
There are no comments for this item.