|
![]() |
|||
|
||||
Overview* After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks * Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years * An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and industry network needs * Discusses software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies Full Product DetailsAuthor: Department of Defense , Cliff Wang , Steven King , Ralph WachterPublisher: John Wiley and Sons Ltd Imprint: John Wiley & Sons Inc Dimensions: Width: 22.20cm , Height: 4.30cm , Length: 27.80cm Weight: 1.604kg ISBN: 9780471787563ISBN 10: 0471787566 Pages: 688 Publication Date: 01 June 2007 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Out of Stock Indefinitely Availability: Awaiting stock ![]() Table of ContentsReviewsAuthor InformationIn 2001, the Director of Defense research and Engineering in the Office of the Secretary of Defense initiated an $80 million, five-year research program at U.S. universities in critical infrastructure protection and high confidence adaptable software. Managed by the Department of Defense science offices, these projects produced the results summarized here. Tab Content 6Author Website:Countries AvailableAll regions |