1 option
New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentland.
- Format:
- Book
- Series:
- MIT Connection Science and Engineering Ser.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- Internet--Security measures.
- Internet.
- Physical Description:
- 1 online resource.
- Place of Publication:
- Cambridge, MA : MIT Press, [2018]
- System Details:
- text file
- Summary:
- Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
- Contents:
- I Management, Organizations & Strategy
- Chapter 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives / Nazli Choucri Choucri, Nazli, Stuart Madnick Madnick, Stuart, Priscilla Koepke Koepke, Priscilla 11
- Chapter 2 Cybersafety: A Systems Theory Approach To Managing Cybersecurity Risks-Applied to TJX Cyberattack / Hamid Salim Salim, Hamid, Stuart Madnick Madnick, Stuart 81
- Chapter 3 Measuring Stakeholders' Perceptions of Cybersecurity for Renewable Energy Systems / Stuart Madnick Madnick, Stuart, Mohammad S. Jalali Jalali, Mohammad S., Michael Siegel Siegel, Michael, Yang Lee Lee, Yang, Diane Strong Strong, Diane, Richard Wang Wang, Richard 113
- Chapter 4 Fixing a Hole: the Labor Market for Bugs / Ryan Ellis Ellis, Ryan, Keman Huang Huang, Keman, Michael Siegel Siegel, Michael, Katie Moussouris Moussouris, Katie, James Houghton Houghton, James 129
- II Architecture
- Chapter 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA) / Robert N. M. Watson Watson, Robert N. M., Peter G. Neumann Neumann, Peter G., Simon W. Moore Moore, Simon W. 163
- Chapter 6 Fundamental Trustworthiness Principles / Peter G. Neumann Neumann, Peter G. 199
- Chapter 7 ISP-Hardware Enforcement of Security Policies / Gregory T. Sullivan Sullivan, Gregory T., Jothy Rosenberg Rosenberg, Jothy, Howard E. Shrobe Shrobe, Howard E., André DeHon DeHon, André 239
- Chapter 8 Stealing Reality: When Criminals Become Data Scientists / Yaniv Altshuler Altshuler, Yaniv, Nadav Aharony Aharony, Nadav, Yuval Elovici Elovici, Yuval, Alex Pentland Pentland, Alex, Manuel Cebrian Cebrian, Manuel 267
- Chapter 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism / Hamed Okhravi Okhravi, Hamed, Howard Shrobe Shrobe, Howard 293
- III Systems
- Chapter 10 Who's Afraid of the Dark Web? / Harry Halpin Halpin, Harry 315
- Chapter 11 Social Physics and Cybercrime / Yaniv Altshuler Altshuler, Yaniv, Alex Pentland Pentland, Alex 351
- Chapter 12 Behavioral Biometrics / David Shrier Shrier, David, Thomas Hardjono Hardjono, Thomas, Alex Pentland Pentland, Alex 365
- Chapter 13 Data Security and Privacy in the Age of IoT / Thomas Hardjono Hardjono, Thomas, Alex Pentland Pentland, Alex, David Shrier Shrier, David 379
- Chapter 14 Owner Centric Access Management for IoT Data. Incentivizing Data Owners to Share Data into the Data Markets / Thomas Hardjono Hardjono, Thomas 403
- Chapter 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy / Guy Zyskind Zyskind, Guy, Alex Pentland Pentland, Alex 425
- Chapter 16 The Trust::Data Framework as a Solution to the Cybersecurity Challenge / Thomas Hardjono Hardjono, Thomas, David Shrier Shrier, David, Alex Pentland Pentland, Alex 457.
- Notes:
- OCLC-licensed vendor bibliographic record.
- ISBN:
- 9780262346641
- 0262346648
- 9780262346658
- 0262346656
- OCLC:
- 1020319459
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.