MARC details
000 -LEADER |
fixed length control field |
03368nam a22005295i 4500 |
001 - CONTROL NUMBER |
control field |
978-3-319-04612-9 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20170628034113.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140304s2014 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319046129 |
-- |
978-3-319-04612-9 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-3-319-04612-9 |
Source of number or code |
doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UTN |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM053000 |
Source |
bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Wang, Lingyu. |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Network Hardening |
Medium |
[electronic resource] : |
Remainder of title |
An Automated Approach to Improving Network Security / |
Statement of responsibility, etc |
by Lingyu Wang, Massimiliano Albanese, Sushil Jajodia. |
264 #1 - |
-- |
Cham : |
-- |
Springer International Publishing : |
-- |
Imprint: Springer, |
-- |
2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
VIII, 60 p. 23 illus. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
490 1# - SERIES STATEMENT |
Series statement |
SpringerBriefs in Computer Science, |
International Standard Serial Number |
2191-5768 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction -- Related Work -- Attack Graph and Network Hardening -- Minimum-Cost Network Hardening -- Linear-Time Network Hardening -- Conclusion. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions comprised of initially satisfied conditions, thereby making the solution more enforceable. Following a discussion of the complexity issues in this technique, the authors provide an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs. Also included are automated solutions for hardening a network against sophisticated multi-step intrusions. Network Hardening: An Automated Approach to Improving Network Security is a valuable resource for researchers and professionals working in network security. It is also a useful tool for advanced-level students focused on security in computer science and electrical engineering. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Communication Networks. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information systems. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information Systems and Communication Service. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information Systems Applications (incl. Internet). |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Albanese, Massimiliano. |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Jajodia, Sushil. |
Relator term |
author. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783319046112 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
SpringerBriefs in Computer Science, |
-- |
2191-5768 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a> |
912 ## - |
-- |
ZDB-2-SCS |