My Account Log in

1 option

New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentland.

MIT Press Direct (eBooks) Available online

View online
Format:
Book
Contributor:
Shrobe, Howard E., editor.
Shrier, David L., editor.
Pentland, Alex, 1952- editor.
Series:
MIT Connection Science and Engineering Ser.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Internet--Security measures.
Internet.
Physical Description:
1 online resource.
Place of Publication:
Cambridge, MA : MIT Press, [2018]
System Details:
text file
Summary:
Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
Contents:
I Management, Organizations & Strategy
Chapter 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives / Nazli Choucri Choucri, Nazli, Stuart Madnick Madnick, Stuart, Priscilla Koepke Koepke, Priscilla 11
Chapter 2 Cybersafety: A Systems Theory Approach To Managing Cybersecurity Risks-Applied to TJX Cyberattack / Hamid Salim Salim, Hamid, Stuart Madnick Madnick, Stuart 81
Chapter 3 Measuring Stakeholders' Perceptions of Cybersecurity for Renewable Energy Systems / Stuart Madnick Madnick, Stuart, Mohammad S. Jalali Jalali, Mohammad S., Michael Siegel Siegel, Michael, Yang Lee Lee, Yang, Diane Strong Strong, Diane, Richard Wang Wang, Richard 113
Chapter 4 Fixing a Hole: the Labor Market for Bugs / Ryan Ellis Ellis, Ryan, Keman Huang Huang, Keman, Michael Siegel Siegel, Michael, Katie Moussouris Moussouris, Katie, James Houghton Houghton, James 129
II Architecture
Chapter 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA) / Robert N. M. Watson Watson, Robert N. M., Peter G. Neumann Neumann, Peter G., Simon W. Moore Moore, Simon W. 163
Chapter 6 Fundamental Trustworthiness Principles / Peter G. Neumann Neumann, Peter G. 199
Chapter 7 ISP-Hardware Enforcement of Security Policies / Gregory T. Sullivan Sullivan, Gregory T., Jothy Rosenberg Rosenberg, Jothy, Howard E. Shrobe Shrobe, Howard E., André DeHon DeHon, André 239
Chapter 8 Stealing Reality: When Criminals Become Data Scientists / Yaniv Altshuler Altshuler, Yaniv, Nadav Aharony Aharony, Nadav, Yuval Elovici Elovici, Yuval, Alex Pentland Pentland, Alex, Manuel Cebrian Cebrian, Manuel 267
Chapter 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism / Hamed Okhravi Okhravi, Hamed, Howard Shrobe Shrobe, Howard 293
III Systems
Chapter 10 Who's Afraid of the Dark Web? / Harry Halpin Halpin, Harry 315
Chapter 11 Social Physics and Cybercrime / Yaniv Altshuler Altshuler, Yaniv, Alex Pentland Pentland, Alex 351
Chapter 12 Behavioral Biometrics / David Shrier Shrier, David, Thomas Hardjono Hardjono, Thomas, Alex Pentland Pentland, Alex 365
Chapter 13 Data Security and Privacy in the Age of IoT / Thomas Hardjono Hardjono, Thomas, Alex Pentland Pentland, Alex, David Shrier Shrier, David 379
Chapter 14 Owner Centric Access Management for IoT Data. Incentivizing Data Owners to Share Data into the Data Markets / Thomas Hardjono Hardjono, Thomas 403
Chapter 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy / Guy Zyskind Zyskind, Guy, Alex Pentland Pentland, Alex 425
Chapter 16 The Trust::Data Framework as a Solution to the Cybersecurity Challenge / Thomas Hardjono Hardjono, Thomas, David Shrier Shrier, David, Alex Pentland Pentland, Alex 457.
Notes:
OCLC-licensed vendor bibliographic record.
ISBN:
9780262346641
0262346648
9780262346658
0262346656
OCLC:
1020319459
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account