000 03668nam a2200589 i 4500
001 8327691
003 IEEE
005 20220712204919.0
006 m o d
007 cr |n|||||||||
008 180605s2018 mau ob 001 eng d
020 _a9780262346641
_qelectronic bk.
020 _z0262346648
_qelectronic bk.
020 _z9780262535373
020 _z0262535378
035 _a(CaBNVSL)mat08327691
035 _a(IDAMS)0b00006487b95bf8
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aTK5105.59
_b.N3464 2018eb
082 0 4 _a658.4/78
_223
245 0 0 _aNew solutions for cybersecurity /
_cedited by Howard Shrobe, David L. Shrier, and Alex Pentland.
264 1 _aCambridge, Massachusetts :
_bMIT Press,
_c[2018]
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2018]
300 _a1 PDF (504 pages).
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aMIT connections science & engineering
504 _aIncludes bibliographical references and index.
505 0 _aIntro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risks�a#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholders�a#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
505 8 _aCHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISP�a#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
505 8 _aCHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies
506 _aRestricted to subscribers or individual electronic text purchasers.
520 _aExperts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 0 _aPrint version record.
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aInternet
_xSecurity measures.
_97338
650 7 _aComputer networks
_xSecurity measures.
_2fast
_93969
650 7 _aInternet
_xSecurity measures.
_2fast
_97338
655 4 _aElectronic books.
_93294
700 1 _aShrobe, Howard E.,
_eeditor.
_925322
700 1 _aShrier, David L.,
_eeditor.
_925323
700 1 _aPentland, Alex,
_d1952-
_eeditor.
_925324
710 2 _aIEEE Xplore (Online Service),
_edistributor.
_925325
710 2 _aMIT Press,
_epublisher.
_925326
776 0 8 _iPrint version:
_tNew solutions for cybersecurity.
_dCambridge, MA : MIT Press, [2018]
_z9780262535373
_w(DLC) 2017040417
_w(OCoLC)1003255394
830 0 _aMIT connections science & engineering
_925327
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8327691
942 _cEBK
999 _c73540
_d73540