Sold Out
Book Categories |
Preface | ||
Introduction | ||
Architectures for intrusion tolerant database systems | 3 | |
The design of an adaptive intrusion tolerant database system | 14 | |
Foundational proof-carrying code | 25 | |
Type-preserving compilation of featherweight Java | 35 | |
A Type system for certified binaries | 60 | |
Protecting privacy using the decentralized label model | 89 | |
Enforceable security policies | 117 | |
Untrusted hosts and confidentiality : secure program partitioning | 138 | |
COCA : a secure distributed online certification authority | 152 | |
Self-securing storage : protecting data in compromised systems | 195 | |
Linux security modules : general security support for the linux kernel | 213 | |
Buffer overflows : attacks and defenses for the vulnerability of the decade | 227 | |
Quantifying the cost of providing intrusion tolerance in group communication systems | 241 | |
Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system | 251 | |
Survival by defense-enabling | 261 | |
Protection of software-based survivability mechanisms | 273 | |
Design and evaluation of a wide-area event notification service | 283 | |
Making mobile code both safe and efficient | ||
SITAR : a scalable intrusion-tolerant architecture for distributed services | 359 | |
The design and implementation of an intrusion tolerant system | 368 | |
Learning unknown attacks - a start | 374 | |
Developing a heterogeneous intrusion tolerant CORBA system | 387 | |
Hardening COTS software with generic software wrappers | 399 | |
Detecting and countering system intrusions using software wrappers | 414 | |
Bibliography | 426 | |
Author index | 435 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionFoundations of intrusion tolerant systems
X
This Item is in Your InventoryFoundations of intrusion tolerant systems
X
You must be logged in to review the productsX
X
X
Add Foundations of intrusion tolerant systems, This book compiles publications from the Department of Defense's Organically Assured and Survivable Information Systems (OASIS) program, describing the latest work in computer system intrusion tolerance. There is material on intrusion tolerant databases, , Foundations of intrusion tolerant systems to the inventory that you are selling on WonderClubX
X
Add Foundations of intrusion tolerant systems, This book compiles publications from the Department of Defense's Organically Assured and Survivable Information Systems (OASIS) program, describing the latest work in computer system intrusion tolerance. There is material on intrusion tolerant databases, , Foundations of intrusion tolerant systems to your collection on WonderClub |