Skip to:Content
|
Bottom
Cover image for Disruptive security technologies with mobile code and peer-to-peer networks
Title:
Disruptive security technologies with mobile code and peer-to-peer networks
Personal Author:
Publication Information:
Boca Raton, FL : CRC Press, 2005
ISBN:
9780849322723

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004990838 TK5105.525 B76 2005 Open Access Book Book
Searching...

On Order

Summary

Summary

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms.

Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.

Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.


Table of Contents

Overview
Network Security Problems
Current Security Solutions
Disruptive Technologies
Understanding Networks
Understanding Mobile Code
Protecting Mobile Code
Protecting Mobile Code Platforms
Maintaining Trust on the Network
Designing Peer-To-Peer Systems
Emergent Routing and Resource Discovery
Denial of Service Countermeasures
Conclusions
Index
Go to:Top of Page