000 03543nam a22005295i 4500
001 978-3-031-02334-7
003 DE-He213
005 20240730163455.0
007 cr nn 008mamaa
008 220601s2010 sz | s |||| 0|eng d
020 _a9783031023347
_9978-3-031-02334-7
024 7 _a10.1007/978-3-031-02334-7
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aDatta, Anupam.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_978760
245 1 0 _aAnalysis Techniques for Information Security
_h[electronic resource] /
_cby Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps.
250 _a1st ed. 2010.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2010.
300 _aXI, 152 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Information Security, Privacy, and Trust,
_x1945-9750
505 0 _aIntroduction -- Foundations -- Detecting Buffer Overruns Using Static Analysis -- Analyzing Security Policies -- Analyzing Security Protocols.
520 _aIncreasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols.
650 0 _aData protection.
_97245
650 1 4 _aData and Information Security.
_931990
700 1 _aJha, Somesh.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_978761
700 1 _aLi, Ninghui.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_978762
700 1 _aMelski, David.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_978763
700 1 _aReps, Thomas.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_978764
710 2 _aSpringerLink (Online service)
_978765
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031012068
776 0 8 _iPrinted edition:
_z9783031034626
830 0 _aSynthesis Lectures on Information Security, Privacy, and Trust,
_x1945-9750
_978766
856 4 0 _uhttps://doi.org/10.1007/978-3-031-02334-7
912 _aZDB-2-SXSC
942 _cEBK
999 _c84650
_d84650