• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

    Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks by Brooks, R.R.;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 150.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        75 915 Ft (72 300 Ft + 5% VAT)
      • Discount 20% (cc. 15 183 Ft off)
      • Discounted price 60 732 Ft (57 840 Ft + 5% VAT)

    75 915 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. Disruptive security technologies are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms. This book builds a foundation for developing these adaptive systems, describing the design principles and the fundamentals of this new security paradigm. The author covers topics such as the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.

    More

    Long description:

    The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms.

    Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.

    Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.

    More

    Table of Contents:

    Overview. Network Security Problems. Current Security Solutions. Disruptive Technologies. Understanding Networks. Understanding Mobile Code. Protecting Mobile Code. Protecting Mobile Code Platforms. Maintaining Trust on the Network. Designing Peer-To-Peer Systems. Emergent Routing and Resource Discovery. Denial of Service Countermeasures. Conclusions. Index.

    More