Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Adaptive security and cyber assurance for risk-based decision making
by
Brooks, Tyson T., author
in
Computer networks Security measures.
/ Management information systems Security measures.
/ Computer crimes Risk assessment.
/ Adaptive computing systems.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Adaptive security and cyber assurance for risk-based decision making
by
Brooks, Tyson T., author
in
Computer networks Security measures.
/ Management information systems Security measures.
/ Computer crimes Risk assessment.
/ Adaptive computing systems.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Adaptive security and cyber assurance for risk-based decision making
Book
Adaptive security and cyber assurance for risk-based decision making
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
\"This book explores adaptive security techniques through CyberAssurance for risk-based decision making in the context of software-based systems and discusses ways to achieve it. It identifies a discipline termed CyberAssurance, which considers the interactions of assurance-enhancing technology, system architecture, and the development life cycle. It looks at trust-enhancing technology in some detail, articulating a strategy based on three main prongs: building software that behaves securely (high-confidence design techniques), executing software in a protected environment (containment), and monitoring software execution for malicious behavior (detection). Applying these three prongs in combination in the proper architectural and life cycle contexts provides the best risk strategy methods for increasing our trust in software-based for Internet of Things (IoT), Cloud, and Edge systems\"-- Provided by publisher.
Publisher
Engineering Science Reference
Subject
ISBN
9781668477663, 9781668477670
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| TK5105.59 .B77 2023 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.